What is authentication, authorization, and Accounting? Please provide an example (see pages 223-226) *USE ACADEMIC REFERENCES*2 Pages No PlagrismMinimum 5 citations (use textbook_1.png for one of

DISCUSSION TEMPLATE


DISCUSSION QUESTIONS

There is need to use references for all your discussions but not necessary when responding to other students’ discussions. The references must be three years old. See the template for appropriate in-text citation for APA guidelines. A total of one reference is needed plus your text book.

Your discussion must be two paragraphs long with three sentences in each paragraph.

EXAMPLE

Please provide example here that pertains to this DQ

REFERENCES

Use two references including textbook. Inappropriate citation of references can result in lower discussion grade.

SAMPLE

DQ INITIAL RESPONSE

Provide an example based on your professional experiences of how network security is managed in your organization

Stewart (2013) stated Network Security is to ensure the information in both equipment and programming advancements. It oversees get to and shields from the assortment of dangers and prevents them from entering to our network. Network Security layer executes strategies and controls. By this Network Security, the Authorized clients just access network assets, and malevolent clients will be obstructed from conveying dangers to our network (Stewart, 2013).

Network security begins with various sorts of Authentications, with a username and a secret key – this named as one-factor verification. While two-factor confirmation, we can add some more assurance to one-factor verification like a security token or 'dongle', an ATM card, or a cell phone (Stenfelt, Kopplin, & Mattsson, 2016). What's more, three-factor confirmation, we can add some more assurance to the two-factor validation like a unique finger impression or retinal sweep.

EXAMPLE 

We had one little import pass on business where every last one of the PCs is connected through LAN. Each time it is essential to store the information and secure the information so yet to the right uses similar utilizations can see and take that data. We ensure our entire structures by playing out the running with advances and making our entire framework protected and secure.

VPN's are used to set up an encoded relationship over a framework while using the Internet as its transmission medium. It's unassuming. As opposed to acquainting additional equipment and organizations with making a sheltered relationship between one place and another, a VPN uses the Internet, which is starting from now set up.

REFERENCES

J. Michael Stewart (2013), Network Security, Firewalls, and VPNs, Second Edition - Virtual Lab

Access (LMS Integration), 2nd Edition

ISBN(s): 9781284163117, N/A, 1284163113.

Stenfelt, J., Kopplin, D., & Mattsson, H. (2016). U.S. Patent No. 9,380,460. Washington, DC:

U.S. Patent and Trademark Office.