Category: Access Control, Authentication, & Identity Management

Learn how security and network administrators restrict access, grant authorization, and authenticate their users.

Tips for Securing Your Network

Before I begin, let's address two obvious questions. Number one, what kind of network are we talking about here? I'm referring to a large or enterprise network. However, you can implement some of these security solutions on your home or SOHO network. Well, maybe you wouldn't want a network access enterprise server at your home. ...

Switch Security

I've made several posts about switches, how they function, and the amazing features they possess, but now it's time to talk about their security. Let's start with switching loops. Switching Loops and STP/RSTP In some cases, a network can develop a "switching loop," sometimes called a "bridging loop." In networks with a lot of switches, ...

Access Control Models

Important Access Control Concepts Access control follows the identification and authentication process, and once users are authenticated, security and network administrators use access controls to ensure that only authenticated users get access to the resources they are authorized to access. There are several models of access control, but before we can discuss these different models, ...

Control Types

Control Types After a user has been identified and authenticated, the next security measure involves authorization and access control. From a broad standpoint, there are three main security control classifications that cybersecurity professionals base on their implementation. They are technical, management, and operational. Technical Controls Technical controls are any controls (both hardware and software) utilizing ...

Methods of Authentication: PPP, AAA, and EAP

How do we authenticate when we login to another device or an application? It's much more than just entering a username and password, right? Well, there are actually many ways to authenticate! I'll discuss some of the main ones we use and what goes on behind the scenes. Point-to-Point Protocols (PPP) If you're familiar with ...