logo

Access Management Research Paper 2022

13 Pages2381 Words71 Views
   

Added on  2022-09-18

Access Management Research Paper 2022

   Added on 2022-09-18

ShareRelated Documents
Running head: ACCESS MANAGEMENT
ACCESS MANAGEMENT
Name of the Student
Name of the university
Author note
Access Management Research Paper 2022_1
1ACCESS MANAGEMENT
Abstract
Security is one of the major issues in the context of information system. Network Access
Control is considered as the solution to networking security issues and this makes use of
different set of protocols for defining as well as implementing a policy describing how a
network can be accessed. Access management is important as it is required to keep a check as
to who is accessing a network. The main aim of access control is minimizing the various risks
of the unauthorized access. The paper will discuss on the access management techniques in
the system and network security. The way in which these techniques are preventing the
intruders from getting into the network is to be analyzed. How effective are these in
preventing cyber attacks is another major topic of discussion in the paper. Lastly, the paper
will recommend certain ways in which these systems can be enhanced.
Access Management Research Paper 2022_2
2ACCESS MANAGEMENT
Table of Contents
Introduction................................................................................................................................3
Research Questions....................................................................................................................3
Research Aims and Objectives...................................................................................................4
Literature Review.......................................................................................................................4
Research Methodology...............................................................................................................8
Ethics in research...................................................................................................................8
Timeline.................................................................................................................................9
Reference..................................................................................................................................10
Access Management Research Paper 2022_3
3ACCESS MANAGEMENT
Introduction
The most important aspect in the enterprise networks, networks of critical
infrastructures and multi-tenant data centre networks is providing proper security. To add to
the already complicated and complex process of ensuring security of the networks is the
various networking equipments that are made use of in these networks. The equipments
include switches, middleboxes, routers and end host vulnerabilities. In this case, deployment
of various security policies requires some specific network settings and these settings cannot
be just arbitrary in nature. The settings should be done as per the standards as well as the
features of various equipments in a network. Thus, as a network involves so many
equipments there is a need to manage as to who can access the same and who cannot. This
requires handling the complicacies in a network and here comes the play of access
management techniques. Network Access Control refers to an approach to the security of a
computer system that takes under its purview endpoint security technologies such as host
intrusion prevention, antivirus, and network security (Li & Hong, 2016). In this domain,
network security comprises of various policies as well as practices that need to be adopted so
that unauthorized access and other such attacks to any network can be prevented. In this
paper, access management techniques in the system and network security will be discussed.
Research Questions
The research questions that will be considered in this case are as follows:
1. How have access management techniques been modified or new innovations made, to
make them suitable for this increasingly growing digitalization?
2. How effective these techniques have been in controlling unauthorized access to any
network?
Access Management Research Paper 2022_4

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Host and Application Security
|9
|1653
|308

Computer and Network Security Content
|21
|1055
|20

Cryptography Techniques and Challenges: An Overview
|5
|1751
|65

Assignment on CYBER SECURITY: WannaCry Attack
|12
|2488
|20

Network Security: Report on OSI Security Architecture and Cryptographic Algorithms
|16
|2776
|371

Information and System Security Research Paper 2022
|4
|765
|7