The Access Control And User Authentication Computer Science Essay

Published:

This essay has been submitted by a student. This is not an example of the work written by our professional essay writers.

Access control is a system method for imposing controls allow or deny user access to network resources. It is usually based on account of users. Access control is according to user identity and their ownership to confine access certain information items or control functions. So it can determines, who're administrator and ordinary users? Unless according, our network security will be occur risk. Each Network Interface Cards have a unique hardware address, know as MAC address, via the Access Control table we can defines which cards can access and which cards can't access but this maybe have some risk because cracker maybe imitate our MAC address to access our network.

User Authentication is security feature that allow administrators to control who has access to the network or it is act of confirming someone as authentic. This involve confirming the identity of person to ensure.

For example, need carry out user state authentication when user using the IT operation or the use of non-mobile communications to register. The purpose is check whether the user is in arrears shutdown; carry out authentication of user individual when users need to extract information of user individual, for example, using WAP business. User authentication is from mobile data service management platform of province of user's ascription to complete.

Firewall

A firewall is a system that can become hardware device or software program that prevents unauthorized intrusion from the Internet. It functions as entry and exit point between a company network and the Internet in order to monitor communication and block unauthorized access while permitting authorized communications.

A good firewall protection is intruder must first pass through the firewall security perimeter in order to access the target computer. You can configure the firewall into many different levels of protection. High level of protection may prohibit some services, such as video streaming, but at least this is the protection of your own choice.

Generally, Firewall has four several type of techniques. They are "Packet filter", "Application gateway", "Circuit-level gateway", "Proxy server".

The most basic function of a firewall is "packet filtering", which searches for information such as the IP address of packets, as well as TCP and UDP port numbers. Only packets that contain a previously registered and permitted IP address, TCP port number or UDP number are allowed to pass through the firewall. This prevents the intrusion of packets that don't have permission.

A router can also be used to provide this function. However, the difference between a router and firewall is that a router is designed in principle to let all packets through, which makes it necessary to register packets that are to be blocked. In contrast, a firewall is designed in principle to block all packets, which makes it necessary to register the packets that are to be let through.

Virus protection

Virus is a malicious program that spreads by replicating itself intruding into other computer without the user's knowledge to destroy data within the computer. It is the greatest threat upon usage of information systems and the internet. It usually has a life cycle contain infection, dormancy and appearance of symptoms.

There are several types of virus:

Malware, Trojan, Spyware, Stealth and etc…

Type of virus by infection object:

Program Virus: infects other program during the program running. It infection is dependent on the type of OS and machine.

Macro Virus: when the file is opened it will infection occur that are created using applications such as word processing. It infection isn't dependent on the type of OS and machine.

Boot sector virus: Stores the program that infects the location. They are executing when the system launch. It infection is dependent on the type of OS and machine.

There are manufacturer of antivirus:

Kasper sky, Symantec, Microsoft, Panda, Avatar and etc….

Accessing the Internet

Internet is a global system of interconnected networks comprising of LANs and WANs at corporations, and single computers in individual households. By using the Internet, it is possible to view Web pages and exchange e-mail. In addition, it is possible to transmit information across the globe by creating and publishing a personal Web page.

Task 2

Does she entering the correct user name?

If she doesn't entering correct that she must to correct the cause.

Does she typing the correct password?

If she doesn't typing correct that she must to correct the cause and passwords are case sensitive.

Has she's account been disabled or locked out?

If disabled she must enable her account or we must to administration the network enabler her account.

Does the computer connect to the server?

If the computer is disconnect to server that we must to connect.

Is the printer's power on?

If the printer's power off, she must power on.

Is the selected shared printer machine the correct one for the client computer's driver?

If the selected shared printer machine isn't the correct one for the client computer's driver, we must change the driver or upgrade driver.

Is the shared printer machine the correct for your selected?

If it is incorrect for your selected that must to select correct.

Task 3

Cisco Small Business RV042 Dual WAN Virtual Private Networking Router

Full duplex capability, firewall protection, switching, DMZ port, routing, auto-sensing per device

Network connections are the backbone of business connections.

Support NAT technology, DHCP Server, VPN pass-through

Supports up to four wired and 50 off-site connections.

The latter allows users to connect into your network with secure access to your files and intranet.

The RV042 comes with dual Internet ports that can serve as a failsafe system for 24/7 network uptime, or as a secondary connection to a separate Internet provider.

Whether they're used for backup or speed boosting, the router's networking hardware will keep bottlenecks away from your network.

Linksys E3000 High Performance Wireless-N Router

MAC address filtering, parental control, firmware upgradable, firewall protection

Support NAT technology, VPN pass-through, 128-bit encryption

A Wireless-N router with simultaneous 2.4 and 5 GHz bands designed to increase bandwidth.

Keep Wi-Fi freeloaders and Internet threats at bay with WPA/WPA2 security settings.

Use the Gigabit Ethernet ports for quicker file sharing between other Gigabit-enabled devices like media servers, hard drives and computers.

Linksys Wireless-G Broadband Routers 

There's the Wireless Access Point, lets you connect Wireless-G device to the network.

Built-in 4-port full-duplex 10/100 Switch to connect your wired-Ethernet devices.

Connect four PCs directly, or daisy-chain out to more hubs and switches to create as big a network as you need.

Ties it all together and lets your whole network share a high-speed cable or DSL Internet connection.

To protect your data and privacy, the Wireless-G Broadband Router can encrypt all wireless transmissions.

Support DHCP Server, NAT technology, supports VPN pass-through, MAC address filtering, firewall protection.

Configuration is a snap with the web browser-based configuration utility. With the Linksys Wireless-G Broadband Router at the center of your home or office network, we can share a high-speed Internet connection, files, printers, and multi-player games with the flexibility, speed, and security.

Reasons for the appropriateness of a particular firewall for organization

Reason of use Linksys Wireless-G Broadband Router WRT54GL Wireless

It supports DHCP Server, NAT technology to protect against Internet intruders, supports VPN pass-through, and can be configured to filter internal users' access to the Internet.

The router can encrypt all wireless transmissions.

It can share a high-speed Internet connection, files, printers, and multi-player games with the flexibility, speed, and security.

Task 4

Organization's policy for accessing the WWW

Acceptable

in an acceptable way to accessing the www

All of organization people must comply with current legislation

Don't misuse of the internet to create unnecessary business risk to the company

Unacceptable

Visiting pornographic, obscene, hateful or otherwise illegal material websites.

Downloading any commercial software or/and any copyrighted materials belonging to third parties

Introducing any form of malicious software into the corporate network

Perpetrate any fraud, software, film and music piracy by using the computer

Stored on third-party websites that organization owned information

Access the WWW to send harassing material to other users

Cracking into unauthorized areas or other organizations

Revealing confidential information about our organization in a personal online posting, upload or transmission - including financial information and information relating to our customers, business plans, policies, staff and internal discussions

waste staff effort or waste networked resources by undertaking deliberate activities

Publishing defamatory or knowingly false material about our organization on social networking sites, blogs, wikis or any online publishing format such as Facebook, Myspace, Netlog and etc…

Organization's policy for Instant Messengers and chat room

Acceptable

in an acceptable way to chat

All of organization people must comply with current legislation

Don't misuse of the internet to create unnecessary business risk to the company

Unacceptable

Set up personal businesses or send chain letters by using the organization's communication systems

Discussing organization's privacy messages with external locations

Chatting or sending images, text or materials that contains considered indecent, pornographic, obscene or illegal

Chatting or sending images, text or materials that might be considered discriminatory, offensive or abusive, in that the context is a personal attack, sexist or racist, or might be considered as harassment

violates the copyright such as accessing copyrighted information in a way

breaking into the organization's system or another organization's system or unauthorized use of mailbox

Discussing unsolicited personal matter on social, political, religious or other non-business related matters

Transmitting material of unsolicited advertising

waste staff effort or waste networked resources by undertaking deliberate activities

introducing any computer virus or malware into the corporate network

Organization's policy for Email Usage

Acceptable

in an acceptable way to use email

All of organization people must comply with current legislation

Don't misuse of the internet to create unnecessary business risk to the company

Unacceptable

Set up personal businesses or send chain letters by using the organization's communication systems

Forwarding organization's privacy messages to external locations

Distributing, disseminating or storing images, text or materials that including considered indecent, pornographic, obscene or illegal

distributing, disseminating or storing images, text or materials that might be considered discriminatory, offensive or abusive, in that the context is a personal attack, sexist or racist, or might be considered as harassment

violates the copyright such as accessing copyrighted information in a way

breaking into the organization's system or another organization's system or unauthorized use of mailbox

broadcasting unsolicited personal views on social, political, religious or other non-business related matters

Transmitting material of unsolicited advertising

waste staff effort or waste networked resources by undertaking deliberate activities

introducing any form of computer virus or malware into the corporate network

Task 5

-----------Local Mode Diagnosis:Start - 2010/11/02(11hr:38min:14sec)-----------

Log Location: C:\Users\RongHao.Yang\AppData\Roaming\IPSecureLogs\LocalMode2010-11-02(11hr-38min-14sec)

Local IP: 192.168.1.118, Remote Machine: 192.168.1.20

SystemInfo:

--Passed: System information(software, hardware,active processes, active network connections) collected. View Output Logs for details

Network Interface Diagnosis:

--Passed : Network Interface configured correctly

Ping (Remote Reachability) Diagnosis:

Passed: Remote machine,"192.168.1.20", is reachable from host

NAP Client Diagnosis:

--Information : NAP client is running

---- NAP logs collected

IPsec Service Diagnosis:

--Passed : IPsec services are up and running

----BFE up and running

----IKEext/Policyagent up and running

Live Debugging: Start

--Information: Enabling RRAS Trace

WFPUtil Diagnosis:

(If you did not repro the issue while the tool was running, ignore WFPUtil Diagnosis)

This Diagnosis report is for negotiation between host and 192.168.1.20

Failed: No IKE negotiaton found between Host machine and 192.168.1.20. This could be because:

--1.Wrong value was entered for the Desitnation IP Address(Client2 IP)

--2.Wrong log was provided

--3.IPSec is not monitoring traffic between Host machine and 192.168.1.20

Live Debugging: End

RRAS Diagnosis:

--Passed : RRAS is switched off, implying no external policies

--Information: Disabling RRAS trace that was enabled during live debugging.RRAS logs copied.

Registry and Events Diagnosis:

--Passed: System, Application and Security event logs collected

Windows Firewall Diagnosis:

--Information : Firewall is active

IPsec SA, Filter Diagnosis:

--Failed : No Main mode SA exists between 192.168.1.118 and 192.168.1.20

--Failed : No Quick mode SA exists between 192.168.1.118 and 192.168.1.20

--Information : No Legacy MM policies applied on this system

--Information : No active IKEEXT rule was found on this system

--Failed : No policies on this system

--Information : No legacy MM outbound filters between exist between 192.168.1.118 and 192.168.1.20

--Information : No Legacy MM inbound filters between exist between 192.168.1.118 and 192.168.1.20

-----------Local Mode Diagnosis:End - 2010/11/02(11hr:39min:09sec)-----------

Writing Services

Essay Writing
Service

Find out how the very best essay writing service can help you accomplish more and achieve higher marks today.

Assignment Writing Service

From complicated assignments to tricky tasks, our experts can tackle virtually any question thrown at them.

Dissertation Writing Service

A dissertation (also known as a thesis or research project) is probably the most important piece of work for any student! From full dissertations to individual chapters, we’re on hand to support you.

Coursework Writing Service

Our expert qualified writers can help you get your coursework right first time, every time.

Dissertation Proposal Service

The first step to completing a dissertation is to create a proposal that talks about what you wish to do. Our experts can design suitable methodologies - perfect to help you get started with a dissertation.

Report Writing
Service

Reports for any audience. Perfectly structured, professionally written, and tailored to suit your exact requirements.

Essay Skeleton Answer Service

If you’re just looking for some help to get started on an essay, our outline service provides you with a perfect essay plan.

Marking & Proofreading Service

Not sure if your work is hitting the mark? Struggling to get feedback from your lecturer? Our premium marking service was created just for you - get the feedback you deserve now.

Exam Revision
Service

Exams can be one of the most stressful experiences you’ll ever have! Revision is key, and we’re here to help. With custom created revision notes and exam answers, you’ll never feel underprepared again.