Abstract— Trusted Computing Group (TCG) is providing a great effort to provide network security at every level, that’s why the technologies of trusted computing group are spreading very rapidly and will become the most leading technologies in next few years. Always there are Threats to networks, which create need for some features to secure the network at end point admission. The flow of information must be confident and data integrity measures should also be followed. The models provided by trusted computing group provides high and powerful security features, TNC: Trusted Network Connect is a technology provided by TCG, which provides security both at hardware and software platforms. TNC is basically used for NAC (Authentication Purpose). The Architecture of NAC provides a clear background of how a network can be made secure and how to avoid unauthorized access. IEEE 802.1x is a standard which provide port based network access control and protect the network from unauthorized access. If the access register is unauthorized then access is given but access is not given when the access is unauthorized. IEEE 802.1x is basically used for authentication and authorization purpose. This paper aims to review the literature of trusted computing in context of trusted network connect and 802.1x port based authentication using NAC.
Keywords- Trusted network connect; 802.1x; Network access control; Security mechanisms; EAP
I. INTRODUCTION
Security is often seen as exclusive requirement in networking, providing security is an important issue. A lot of problems are there so a lot of security measures should be provided. Security is more important than ever before due to many reasons. When a network is implemented poorly, security threats and ...
... middle of paper ...
...licy | Issues with `trusted computing', Proceedings of PODC '03, July 13-16, 2003, Boston, Massachsetts, USA, ACM, 2003, pp. 3{10.
[16] B. Arbaugh, Improving the TCPA specification, IEEE Computer 35 (2002), no. 8, 77{79.
[17] GUNNAR STEVENS “Computer-Supported Access Control” Spetember 2009
[18] René Korthaus, Ahmad-Reza Sadeghi, Christian Stüble, Jing Zhan “A Practical Property-based Bootstrap Architecture” November 2009
[19] ROBERT GRIMM and BRIAN N. BERSHAD “Separating Access Control Policy, Enforcement, and Functionality in Extensible Systems” vol 19, No 1, pages 36-70, Feb 2001
[20] Daniel B. Faria, David R. Cheriton “DoS and Authentication in Wireless Public Access Networks” Sep 28, 2002
[21] Ulrich Kühn, Marcel Selhorst, and Christian Stüble “Realizing Property-Based Attestation and Sealing with Commonly Available Hard- and Software” 2007
In this section we investigate attacks and threats to our primary devices. These attacks and threats are built off of the vulnerabilities the previous section and help to determine which security controls would be most valuable against future attacks.
Do we have a well-defined and documented policy for electronic authentication, authorisation and access control relating to our information systems, applications and data?
User Communications. Dartmouth College, Department of Computing Services. "Computer and Network Policy." BlitzMail Bulletin. Wed, 15 Nov 2000 13:36:45.
This research paper is a comprehensive look at DoS attacks, including information about their history and development, how to detect them, and what measures should be taken to prevent large amounts of damage.
...Belittles Security Flaw." Technology News, Tech Product Reviews, Research and Enterprise Analysis - News & Reviews - EWeek.com. EWeek, 25 Aug. 2011. Web. 15 Oct. 2011. .
The deployed wireless network automatically disables rogue access points when required. In order to connect to the wireless network, all wireless laptops are required to be the current domain members. A group policy is enforced to all domain members so as to lock their system to SSID access point. For network layer protection, firewalls must be installed throughout the network. Wireless connections should always be WPA2 secured. All systems must have anti-virus software which provides protection from viruses. To ensure that only valid users access the network system, server certificates are installed in the
Roberts, Richard M. "Network Secrurity." Networking Fundamentals. 2nd ed. Tinley Park, IL: Goodheart-Willcox, 2005. 599-639. Print.
Understanding the access control is the first step to secure any system, following
This paper describes the basic threats to the network security and the basic issues of interest for designing a secure network. it describes the important aspects of network security. A secure network is one which is free of unauthorized entries and hackers
Lanza, J.P. (2003b, May 19). Vulnerability note vu#945216. United States Computer Emergency Readiness Team, Retrieved from http://www.kb.cert.org/vuls/id/945216
It has been demonstrated that a number of interoperable systems must be implemented to fully protect a network; a strategy known as Defense in Depth. Due to the multitude of security devices and device categories available, it can be very difficult to identify the correct tools for meeting security goals. Using the Defense in Depth strategy will require an understanding of the interactions between devices occuring within the network.
A critical part of network planning involves setting up of security mechanisms. Deploying the network with security configuration provides superior visibility, continuous control and advanced threat protection across the extended network. Additionally, security procedures define policies to monitor the network for securing critical data, obtain visibility, mitigate threats, identify and correlate discrepancies.
This paper is going to discuss wireless security from a broad view where I will go into why exactly wireless security is so important especially today as the ways in which we are communicating is changing dramatically. From there I will discuss the multiple wireless securities that are available to give a better understanding of the options given. Then I will go into why exactly not protecting your wireless can be so dangerous with some descriptions on the most dangerous wireless attacks out there today. Finally I will then discuss how we can better prepare for these types of attacks with a synopsis on several effective security methods that will help to ensure data is securely passed and kept hidden.
Rayne, PB, Kulkarni, P, Patil, S & Meshram, BB 2012, ‘Authentication and Authorization:Tool for Ecommerce Security’, Engineering Science and Technology: An International Journal, vol. 2, no. 1, pp. 150-157.
Introduction: This is a 21th century, technology is the most important and improved thing of the human life. It makes life easier and faster. Development of faster sophisticated technology we have better and fast life. So all we are connect each other by computer network. There are two different way of network: Wired and wireless. Now day we can found network almost everywhere. Home, business, public place, Airport, Planes, hospitals, school, train everywhere we can found networking. Therefore, almost every sector of the economy that has affected by wired and wireless technology. Wired network and wireless protect both has security, But in general wireless network is less secure than wired networks. For proper security AP (access point) and its antenna should be right position. Also add a wireless access point or use a wireless router we can connect to network wirelessly. AS we using more and more of devices (smart phones, tablet and computers) rely on wireless networking, we have to improve our network security too.