Protecting the Network through Detection and Network Access Control

Video Activity
Join over 3 million cybersecurity professionals advancing their career
Sign up with
or

Already have an account? Sign In »

Time
12 hours 25 minutes
Difficulty
Intermediate
CEU/CPE
13
Video Transcription
00:00
All right. Next to pieces. Last two pieces of network protection. We have inspection and detection on this slide. Not really gonna spend time here because we've already talked about the benefits of sniffers and intrusion detection systems. Honey pots and I'll mention that a group of honey pots is called the Honey Net.
00:20
It's there to look like a sub net that's available. Vulnerable
00:26
law reviews we've talked about be proactive with your log reviews and an internal versus external audit. They're both can be objective, and they both have pros and cons, right? You have a greater control over the audit if its internal external might give you more objectivity.
00:45
But the last piece that I want to talk about his network access control it's referred to his neck network access control. And the whole purpose of Nak is to protect your network your environment from unhealthy systems so
01:00
Nak will allow access to a system or resource or service
01:06
based on help.
01:07
And if you think about help oven individual system, what would make up a healthy system?
01:14
Well, for one thing, it wouldn't have viruses, right? So does the system have anti virus software that's up to date,
01:21
doesn't have a firewall, Doesn't have spyware protection. Does it allow audit? Or does it? This this this and this have firewall, whatever. So, with network access control, this is really best applied on laptops for your employees that travel and connect lots of different networks.
01:41
They're much more susceptible to getting garbage on their systems.
01:45
So before we allow that system to come back to our whole to their whole network, if you will and connect to the network, they have to be able to prove to our validation server that they're healthy. Okay,
01:59
so obviously they're moving pieces to this. You've gotta have a next server. You've gotta have that. You could have to have a service that understands knack like D H E P. For instance,
02:08
you're gonna have to have a client that runs next software, so it's not quite as easy as it sounds to implement. But ultimately, when you have these moving pieces together, then you're ultimately going to be able to have a lot better control. And it's not like you just have to deny or allow access.
02:28
It's someone doesn't. If a system doesn't have any virus software, for instance,
02:31
you could relocate them to an isolated sub net that has an any virus server, right? They can download that software than they can come back and access the main network. So Nak is a really nice feature. Like I said, it's all about help of the client.
Up Next
Certified Information Security Manager (CISM)

Cybrary's Certified Information Security Manager (CISM) training is a great fit for IT professionals looking to move up in their organization and advance their careers and/or current CISMs looking to learn about the latest trends in the information security industry.

Instructed By