Running head: NETWORK ACCESS CONTROL (NAC)Network Access Control (NAC)Institution AffiliationStudents NameInstructors NameDate of SubmissionNETWORK ACCESS CONTROL (NAC)2NAC Best PracticesAccording to Krutz and Vines (2010), network access control (NAC) refers to the measuresthat need to be put in place to regulate the accessing of the given network by users, devices aswell as software. These controls work to protect the network against unauthorized access. It isparamount for the information technology officers working on any organization to be aware ofthe dangers that may befell the entire organization in the event of a security breach. For thatreason, NAC advocates for transparency and accountability in terms of who is supposed toaccess the network or some part of it, on what kind of device, as well as the location from whichthe network should be accessed. For the security of the network to be assured, there is need toaddress the network security at endpoints, direct logins and remote access.Endpoint security poses a big problem to many networks due to negligence inimplementation of access controls. The endpoint devices including desktops, laptops, scanners,printers and network connected mobile phones are the points from which the users access thenetwork. When employees for the organization are out of the premises and are required to loginto the network to perform some task, they may end up accessing the network from deviceswithout the las ...
To Order an Original Plagiarism Free Paper on the Same Topic Click Here











Other samples, services and questions:
When you use PaperHelp, you save one valuable — TIME
You can spend it for more important things than paper writing.