Access Management Research Paper 2022

Added on -2022-09-18

| 13 pages| 2381 words| 71 views

Trusted by 2+ million users,
1000+ happy students everyday

Showing pages 1 to 4 of 13 pages

Running head: ACCESS MANAGEMENT
ACCESS MANAGEMENT
Name of the Student
Name of the university
Author note
1ACCESS MANAGEMENT
Abstract
Security is one of the major issues in the context of information system. Network Access
Control is considered as the solution to networking security issues and this makes use of
different set of protocols for defining as well as implementing a policy describing how a
network can be accessed. Access management is important as it is required to keep a check as
to who is accessing a network. The main aim of access control is minimizing the various risks
of the unauthorized access. The paper will discuss on the access management techniques in
the system and network security. The way in which these techniques are preventing the
intruders from getting into the network is to be analyzed. How effective are these in
preventing cyber attacks is another major topic of discussion in the paper. Lastly, the paper
will recommend certain ways in which these systems can be enhanced.
2ACCESS MANAGEMENT
Table of Contents
Introduction................................................................................................................................3
Research Questions....................................................................................................................3
Research Aims and Objectives...................................................................................................4
Literature Review.......................................................................................................................4
Research Methodology...............................................................................................................8
Ethics in research...................................................................................................................8
Timeline.................................................................................................................................9
Reference..................................................................................................................................10
3ACCESS MANAGEMENT
Introduction
The most important aspect in the enterprise networks, networks of critical
infrastructures and multi-tenant data centre networks is providing proper security. To add to
the already complicated and complex process of ensuring security of the networks is the
various networking equipments that are made use of in these networks. The equipments
include switches, middleboxes, routers and end host vulnerabilities. In this case, deployment
of various security policies requires some specific network settings and these settings cannot
be just arbitrary in nature. The settings should be done as per the standards as well as the
features of various equipments in a network. Thus, as a network involves so many
equipments there is a need to manage as to who can access the same and who cannot. This
requires handling the complicacies in a network and here comes the play of access
management techniques. Network Access Control refers to an approach to the security of a
computer system that takes under its purview endpoint security technologies such as host
intrusion prevention, antivirus, and network security (Li & Hong, 2016). In this domain,
network security comprises of various policies as well as practices that need to be adopted so
that unauthorized access and other such attacks to any network can be prevented. In this
paper, access management techniques in the system and network security will be discussed.
Research Questions
The research questions that will be considered in this case are as follows:
1. How have access management techniques been modified or new innovations made, to
make them suitable for this increasingly growing digitalization?
2. How effective these techniques have been in controlling unauthorized access to any
network?

Found this document preview useful?

You are reading a preview
Upload your documents to download
or
Become a Desklib member to get accesss

Students who viewed this