This essay has been submitted by a student. This is not an example of the work written by our professional essay writers.
The Distributed Systems made a new several of security threats. The organizations must protect their information from the hackers. This paper will explain one security techniques for protected their information. Then I present about how does the security techniques works. Then I will present the security techniques using Access Control List with Firewalls will present in this paper.
Distributed systems made a new several of security threat. It comes from a wide variety of partners, customers and mobile employees. The unauthorized user access the internal information. The unauthorized user takes this advantage to steal or changes the information and send the new information to the receiver.
To protect this information, an organization need to define security policies, which are high level guidelines that specify the states in which the system is considered to be secure (M.Schumacher, E.BFernandez, D.Hybertson, F.Buschman and P.Sommerlad, 2006). The organization information can protected using the security techniques. In the security techniques distributed systems, we can control access to use shared resources. Who want shared resources must be authorized. Without the security technique we cannot controlling access and hard to prove that no unauthorized access occurred.
Example of security techniques such as Tickets, Access Control Lists, Encryption, EM shielding, Pad Locks, Independent certification and Obscurity. In this paper, I will describe about the Access Control Lists (ACLs).
Before through the details, we must understand what the Access Control List (ACL) in section 2.0 is. After, understand what is the ACL, we go to the next step. In section 3.0 is explain about how ACL work. In this section, we can look how the information can protected from the unauthorized users. ACL also can use with Firewall. This topic will describe in the section 4.0. This section explains how to join the firewall and ACL on the router. Section 5.0 is a suggestion and future work. In this section, the will give a suggestion and the future work to make an information more protected. The last section, 6.0 is a Conclude this paper.
What is the Access Control List
Access Control List (ACL) is one security techniques to protect the information. This is one security use to controlling access from the unauthorized users (Ravi&Pierangela, 1994).
ACL occur on the router. Which, the routers provide basic traffic-filtering. Example for the basic traffic filtering such as blocking Internet traffic with ACL.
An ACL is a sequential list of permit or deny statements that apply to addresses or upper ââ‚¬" layer protocols. Four reason why use a ACL techniques. First, we can limit the network traffic and enhanced the traffic performance. Second, ACL techniques will provides traffic flow control. Third, ACL can provide a basic level of security. This part is for network access. ACL only allow want host and prevent another host go to one area. The last reason is an ACL can decide to block or forwarded the type traffic at the router interface.
How Access Control List Work
Access Control List (ACL) is to ensuring that users systems and processes in a computer system. ACL allows to controlling access to object which subjects can access the object and in what way (Nelly, Eduardo, Maria and Jie, 2007).The users can access computer based resources in a control and authorized manner .The information must be protected from the unauthorized users to access the information.
The ACL is a one group statement that defines how information packets do the following (Charles & Shari, 2007):
Put on a list inbound router interfaces.
Relay using the router.
Exit outbound router interfaces.
The distributed systems processes are same with communication process. The beginning of the process will check ACL are used or not. When an information packets enter an interface, the router checks to see the information packets routable. After router finish checking the information packets, now router will check either the inbound interface has an ACL or not has ACL. If one exists, the packet will test against the conditions in the list. If the information packet allowed, it will check against with routing table entries to determine the destination interface. An ACL filter itââ‚¬â„¢s not a packet that come from in the router itself, but the packet come from the other sources.
Then, the router checks either the outbound interface has an ACL or not has. If it does not have, the packet can be sent to the outbound interface. The ACL statement will operate in a sequential and logical order. In this process if the conditions match is true. The packet is permitted or denied and the rest of the ACL statements are not checked. If all not matched, an implicit denies any statement is imposed. The default will occurred when we are not see the deny any as the last line of an ACL.
ACLs can make to control what clients can access on your network. Two conditions in an ACL file can do the following:
The ACL file will screen out certain host to either allow or deny access to part on your network.
The ACL file can grant or deny users permission to access. The user only can access types of applications such as FTP or HTTP.
Using Access Control List with Firewalls.
Access Control List can used with the firewall. Before, explain how to using the ACL with Firewalls, we must know what meaning for the Firewall. Firewall is about computer or networking device that exists between two types. Two types its means the users and the outside world to protect the internal network from the unauthorized users (CISCO, 2005). Usually the unauthorized users come from the global Internet and the thousand of remote networks that interconnect. Casually, network firewalls have a several different machines that work together to protected the information from the unauthorized users.
I will give one example for more understand about firewall. Firewall will allow the user to communicate with the internet or the permitted only for mail application. Example for the permitted application is a mail. Only mail packets will be allowed through the router. This is because to protected the application gateway and avoid from the unauthorized users access.
ACL also can use with the Firewall. The ACL will use in a firewall routers. Which, the positioned between the internal network and external network, such as Internet. In the firewall router, its provide a points of isolation. A point of isolation not is effect to internet network structure. ACL also can used on a router positioned between two parts of the network. First, two control traffic entering and second is exiting a specific part of the internal network. ACL also can create for each network protocol configured on the router interfaces (on border routers).
Suggestion and Future Work.
In this paper, we can see thatââ‚¬â„¢s the ACL will configure for each the computer. For the future work, we can setup the ACL on the router connect with the one computer as a controlling computer. The controlling computer will connect with the other computers, so from there we not waste time and money. If the unauthorized can access the information, the technicians can block the program using the controlling computer and all computers will protect.
Access Control Systems is the best security techniques to protect the organization information from the unauthorized users. ACL will protect in the router. The router will block, if have unauthorized users access. Only the application such as mail will allow to access with permitted (user id and password). ACL is suitable to the internal and external network. Each of computers will configure using the ACL with the firewall. The organizations will safety using the ACL as the security techniques to protect the information. The information is very valuable for each of company. The competitors always take opportunity to steal the information from the company, so safe the information using the ACL techniques.