Constructively respond to the following 3 Discussion board posts. There is not a word limit so keep response as brief or extensive as you like. The original question is:Network Design – After watching the video, Network Design – CompTIA Security SY0-301: 1.3 , discuss at least two network design concepts you learned from or found interesting in the videoPost 1 The network design concepts that I learned from the video is regarding network access controls. Network access controls are not simple to set up and running them is quite complex if not engineered correctly. Network access controls are very useful in large open environments such as universities and large corporations where people are in various locations. The setting up of network access control requires a large security infrastructure where authentication is very important. Also, it is very important to have proper access control and identity management for the environment.Post 2So I went and got my hands on a copy of the Security Guide to Security textbook. In that book chapter 11 was all about Access Control Fundamentals, and it went into great detail. If covered topics like Discretionary Access Control, Mandatory Access Control, Role Based Access Control, and Rule Based Access Control. The biggest impact I think this had was while reading this I kept thinking about the video we watched and how the guy kept talking about some of these things would take a really long time to implement, but was well worth it regarding security. When I heard it in the video I was like yeah I am sure it takes some time to do, but then the book showed me all the different layers and how the worked together and I can easily now see how that can be very time consuming. I think a video that went into greater detail on what actually goes into access control would have had more of a lasting impression then just the quick brief overview we got.Post 3Network access control is an administration system that is used to secure networks.For example, in a network access control, there could be rules on who has access to certain information or login credentials. In my company only, management may have access to certain screens in the database or inventory management system. This gives control to who gets access to the network system. Firewalls, antivirus software, and other application might also be part of the process of network access control. In terms of setting up or picking a software to manage NAC, I would have to do more research. It would be good to know the process on how to set up NAC. The video did not go into details on the actual process. Which I think is important to know what tools to use.
Delivering a high-quality product at a reasonable price is not enough anymore.
That’s why we have developed 5 beneficial guarantees that will make your experience with our service enjoyable, easy, and safe.
You have to be 100% sure of the quality of your product to give a money-back guarantee. This describes us perfectly. Make sure that this guarantee is totally transparent.
Read moreEach paper is composed from scratch, according to your instructions. It is then checked by our plagiarism-detection software. There is no gap where plagiarism could squeeze in.
Read moreThanks to our free revisions, there is no way for you to be unsatisfied. We will work on your paper until you are completely happy with the result.
Read moreYour email is safe, as we store it according to international data protection rules. Your bank details are secure, as we use only reliable payment systems.
Read moreBy sending us your money, you buy the service we provide. Check out our terms and conditions if you prefer business talks to be laid out in official language.
Read more