preview

Design Proposal Summary

Good Essays

You Decide: Week 5
Name:
DeVry University
NETW208: Introduction to WAN Technologies
Professor: Cook
Date:

Design Proposal Summary
The network team is proposing that access control lists (ACLs) be installed on routers at the Cleveland office. Security policies and procedures have also been considered in order to handle and maintain the ACLs.
Access controls are a sequence of instructions that a router will refer to before either allowing a packet into or out of an interface. This is done by making sure that there are security features in place that control the flow of information as well as how users access the network. An access control list is written as a sequence of one line statements that are processed by the router …show more content…

The policies and procedures will be implemented using access control models. These models will work to enforce the rules and objectives of our security policy and will also dictate user access. Using a discretionary access control (DAC) model will allow the owner of the resources to control who has access as well as the operations that can be performed. Access will be based on the identity of the user and the role that the user plays within the company. This can be done through access control lists (ACLs), where permission is granted on a need-to-know basis.

References

Bera, P. P., Ghosh, S. K., & Dasgupta, P. P. (2010). Integrated security analysis framework for an enterprise network - a formal approach. IET Information Security, 4(4), 283-300. doi:10.1049/iet-ifs.2009.0174
Chi-Shih, C. (2012). A feasible visualized system for anomaly diagnosis of Internet firewall rules. Journal of Communication & Computer, 9(6), 679-691.
Liu, A.X. (2012). Firewall policy change-impact analysis. ACM Transactions on Internet Technology, 11(4), 1-24. doi:10.1145/2109211.2109212
Sunwook, K., Byunggu, K., Seongwoon, K., Jinwon, P., & Yongwha, C. (2012). The NADIA:

Get Access