How to Design Non-Disruptive Network Rules

Elliott, T. Kent
February 2008
Bank Technology News;Feb2008, Vol. 21 Issue 2, p38
Trade Publication
The article discusses the significance of network access control (NAC) technology to employees in the U.S. Survey shows that disrupting the network or impairing key employees productivity were the number one concerns of companies in the country. These can be addressed by NAC wherein it automatically warns user of impending or existing violations so user knows what is happening, what must be done to stay connected or return to compliance and provide a way of achieving corrective actions.


Related Articles

  • Check in Check out Using Blue Tooth Ad Hoc Network (CICO-BT).  // International Journal of Computer Applications;Sep2010, Vol. 7, p21 

    The article presents research aims at integrating the authentication process at the time of entry and exit of employee using mobile phones with the support of Bluetooth (BT) ad-hoc network also known as the check in check out using Blue tooth ad-hoc network (CICO BT). The CICO BT project focuses...

  • BSC: A Novel Scheme for Providing Security using Biometric Smart Card. Mahaboob Hussain, S.; Chakravarthy, A. S. N.; Sarma, G. S. // International Journal of Computer Applications;Oct2013, Vol. 80, p43 

    Technology advances day by day and the new things are being developed. There are many new technologies being introduced and developed in any discipline. Data Security plays a vital role and Biometric security systems is one of the new trends to be developed, which has its advantages for...

  • Home is where the network is.  // Consumer Reports;Sep2002, Vol. 67 Issue 9, p15 

    Offers consumer advice on home network computing. Benefits of network computing, including multiple-user Internet access and costs; Options available for networking, including Ethernet and Phoneline; Other options, such as networking Macintosh computers and using America Online Internet...

  • LAN wiring worries? Use phone, AC lines to untangle. Miastkowski, Stan // PCWorld;Apr98, Vol. 16 Issue 4, p66 

    Evaluates three products that allow you to set up a network using the AC or phone wiring already in your walls. The pre-production version of Intelogis's PassPort;Tut Systems HomeRun; 10BaseT Ethernet; Wiring used; Speed; Price.

  • Spanning tree is still with us. Lewis, Stephen; Back, James // Network World;05/24/99, Vol. 16 Issue 21, p45 

    Focuses on Spanning Tree Protocol, a link management protocol which is a part of the IEEE 802.ID standard for media access control bridges. Use of spanning tree by any device that performs Layer 2 switching; Relevance of Spanning Tree Protocol as long as Layer 2 switches and virtual local area...

  • Demystifying NAC options. Lum, Stacey // Network World;3/17/2008, Vol. 25 Issue 11, p25 

    The article explores the security benefits offered by network access control (NAC) and discusses its different approaches. According to the author, the NAC security framework promises to help companies comply with regulations and internal policies, as well as safeguard resources from evolving...

  • Bridging the Gap: Emphasizing to Students the Importance of Management & IT Working Together. Edge, Irene E.; Wheeler, Jeffrey A. // AURCO Journal;2009, Vol. 15, p97 

    The article focuses on the security risks associated with business establishments. It is stated that students in both Information Technology (IT) and Business Management should be aware of the gap between their rolls in business and its impact on the stability of the company. As stated, security...

  • Investigation of Performance-Security Tradeoff in Robotic Mobile Wireless Ad hoc Networks (RANETs) using Stochastic Petri Nets. Jawad Ikram, Muhammad; Ahmad, Kashif // International Journal of Computer Applications;2013, Vol. 62, p34 

    This paper presents a comprehensive review of performance-security trade-off based on RANETs. It is suggested that stochastic Petri nets (SPNs) are the best choice to investigate performance-security trade-off in RANETs. In the context of RANETs, a mathematical model that is based on SPNs is...

  • A VIEW ON SECURE ROUTING IN ADHOC NETWORKS. Ramana, V. Venkata; Basheer, K.K.; Rao, P. Srinivasa // International Journal on Computer Science & Engineering;2010, Vol. 2 Issue 5, p1887 

    In our proposed research work different security attacks from the perspective of layer approach are identified. The impacts of security attacks on each layer are studied. Then we focus on security attacks on network layer in particular routing. Different solutions for different security attacks...


Read the Article


Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics