Tuesday, May 7, 2019

Security

Implementing Network Security Solution.

Explore a range of:

- Tools (2), Metasploit Framework & Nmap
- Techniques (2) and
- Methods (2)
Used for implementing network security.

3. MOBILE DEVICE MANAGEMENT

MDM software bolsters network security through remote monitoring and control of security configurations, policy enforcement and patch pushes to mobile devices. Further, these systems can remotely lock lost, stolen or compromised mobile devices and, if needed, wipe all stored data.

4. NETWORK ACCESS CONTROL

NAC products enforce security policy by granting only security policy–compliant devices access to network assets. They handle access authentication and authorization functions and can even control the data that specific users access, based on their ability to recognize users, their devices and their network roles.

No comments:

Post a Comment

Key considerations for planning and undertaking research

Determine what the key considerations are for planning and undertaking research. Research questions.  Certain research quest...