TITLE

Can ACLs and NAC mix for security success?

AUTHOR(S)
Snyder, Joel
PUB. DATE
June 2008
SOURCE
NetworkWorld Asia;Jun2008, Vol. 4 Issue 5, p24
SOURCE TYPE
Academic Journal
DOC. TYPE
Article
ABSTRACT
The article discusses the possibility of mixing the access control lists (ACL) and network access control (NAC) for security success. According to the article, the NAC envelope was pushed during the Interop with the decision that access control would be handled with a combination of ACLs and VLANs. It found out that most of the wireless and wired network equipment in the Interop laboratories was able to use ACLs to control end-user policy.
ACCESSION #
32997154

 

Related Articles

  • Top 10 Reasons to Control Employee PDAs. Elfanbaum, Bob; Dinman, Mark // Security: Solutions for Enterprise Security Leaders;Jun2004, Vol. 41 Issue 6, p36 

    Lists concerns that a company should address in getting their handheld security or personal digital assistants (PDA) in order, based on feedback from executives in the U.S. Network passwords; Customer data; Items that should never be stored on a mobile device such as credit card and account...

  • Wireless confidential. Reed, Brad // Network World;5/26/2008, Vol. 25 Issue 21, p16 

    The article focuses on the wireless security threats that includes military communication networks. In the case of WiFi protected access that is easily hacked up by Lockheed Martin with the use the PlayStation 3s (PS 3s) due to its processor called the Cell Broadband Engine. In addition, the...

  • A safer wireless world. Sturdevant, Cameron // eWeek;9/15/2003, Vol. 20 Issue 37, p72 

    It's no secret that installing a wireless network creates security concerns. Network traffic carried over the air should be encrypted to prevent eavesdropping. A handful of vendors are stepping up to fill the void. VigilantMinds recently announced AirXone, an intrusion detection and prevention...

  • Cryptanalysis of Chang-Chang's EC-PAKA protocol for wireless mobile networks. Hae-Soon Ahn; Eun-Jun Yoon // World Academy of Science, Engineering & Technology;2012, Issue 68, p45 

    With the rapid development of wireless mobile communication, applications for mobile devices must focus on network security. In 2008, Chang-Chang proposed security improvements on the Lu et al.'s elliptic curve authentication key agreement protocol for wireless mobile networks. However, this...

  • An Efficient Key Management Scheme for Secure Data Access Control in Wireless Broadcast Services. Rajesh, K. V.; Harini, P. // International Journal of Computer Science & Network Security;Oct2012, Vol. 12 Issue 10, p123 

    Wireless broadcast is an effective approach to dis-seminate data to a number of users. To provide secure access to data in wireless broadcast services, symmetric key - based encryption is used to ensure that only users who own the valid keys can decrypt the data. Regarding various subscriptions,...

  • Providing Security in Granting Agency Using Workflow CRBAC Model. Bahrami, Marzieh; Khayyambashi, Mohammad Reza; Ebrahimi, Seyed Ali Razavi // International Journal of Computer Science & Network Security;Nov2013, Vol. 13 Issue 11, p119 

    There have been many security solutions to secure representation in the work flow used in business processes and Grid Networks. Most of these solutions try to provide maximum security in workflow processes and most of them are used Role-Based Access Control model (RBAC). Capability Role-Base...

  • Endpoint security. Stephenson, Peter // SC Magazine: For IT Security Professionals (UK Edition);Nov/Dec2013, p28 

    The article discusses endpoint security which focuses on how data makes its way into and out of the endpoint. Endpoint security tools are said to be capable of protecting the device from malicious software (malware) and checking if the anti-malware protection can be accomplished successfully by...

  • Cast the runes to assess future risk. Lacey, David // SC Magazine: For IT Security Professionals (UK Edition);Nov2005, p24 

    Encourages information security executives to assess future risk to their network infrastructure rather than focus on historical incident data alone in developing countermeasures. Discussion on the trend in network security; Explanation on how to better predict emerging threats and exposures;...

  • THE insider. McLaughlin, Kevin // CRN;6/19/2006, Issue 1201, p10 

    The article discusses the decision of D&D Consulting, a network solution provider in the U.S., to adopt the Network Access Control technology. As explained by the president and CEO of the company Chris Labatt-Simon, that the new technology provides protection, not only the network boarders but...

Share

Read the Article

Courtesy of THE LIBRARY OF VIRGINIA

Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics