Advanced Network Design
It wasn’t that long ago when the most exotic item you may have placed on your network was a networked printer. Modern networks have moved far beyond simple printers and may now include VoIP systems or even critical infrastructure or SCADA components. Let’s get started by looking at network authentication methods and some of the ways that security professionals can provide authorized access to legitimate users while keeping unauthorized users out.
Network Authentication Methods
Network authentication is a key area of knowledge for the security professional because it serves as the first line of defense. It consists of two pieces: identification and authentication. As an example, think of identification as me saying, “Hi, I am Jeff.” It’s great that I have provided you with that information, but how do you know that it is me? What you need is to determine the veracity of the claim. That’s the role of authentication. Following...