Question Description
I don’t know how to handle this Writing question and need guidance.
- 5.1 Provide a brief definition of network access control.
- 5.2 What is an EAP?
- 5.3 List and briefly define four EAP authentication methods.
- 5.4 What is EAPOL?
- 5.5 What is the function of IEEE 802.1X?
- 5.6 Define cloud computing.
- 5.7 List and briefly define three cloud service models.
- 5.8 What is the cloud computing reference architecture?
- 5.9 Describe some of the main cloud-specific security threats.
Explanation & Answer
Attached.
Running head: CLOUD COMPUTING
1
Discussion
Student’s Name
Institutional Affiliations
Course
Date
CLOUD COMPUTING
2
Discussion
5.1 Provide a brief definition of network access control.
A NAC is critical towards the implementation of organizational policies. Technically, it
deploys the use of a set of approaches to implement a policy after its definition. As a computer
networking parameter, it is attributed to setting policies under various paradigms and roles as
well as access based inclinations. Varghese & Buyya (2018) say that it is also mandated with
the precision of enforcing security compliance, patch control, and several mitigation measures
that come with policy management. the implementation of NAC comes with advantages of
visibility into devices, control of risk, and management of IoT among other substantial
measures.
5.2 What is EAP?
The employee assistance program is designed to ensure that employees get to solve
disputes that might cause escalated problems within the workplace. The intervention program is
developed to spot and help employees create a conducive environment in the workplace.
Various problems that the EAP solves include marital, family, as well as substance abuse,
among others (Varghese & Buyya, 2018). Various workplaces have benefited from the
program. Attributions such as employee retention, reduced absenteeism, decreased labor
disputes, and fewer accidents get experienced in jobs; championing the adoption of EAP is
critical for the firms as a result.
CLOUD COMPUTING
3
5.3 List and briefly define four EAP authentication methods.
The EAP authentication methods are EAP-TLS, EAP-TTLS, EAPGPSK, and EAPIKEv2. The EAP-TLS is defined as an open standard supported by various wireless vendors. It
is an IETF using Transport Layer Security to achieve its functions. The EAP-TTLS is an
extension of the EAP-TLS, and it is known to require server-side certificates to operate. EAPIKEv2 works to provide authentication and session key between the EAP peer and EAP server.
Authentication parameters consisting of passwords and public key certificates get supported
through this algorithm. EAPGPSK supports mutual authentication and the inclination of
deriving keys. It is defined as a lightweight shared-key authenticator.
5.4 What is EAPOL?
It is a network authentication protocol that the IEEE802.1x uses. It is created for the
stance of giving a generic network sign-on for the proficiency of accessing network resources.
EAPOL stands for extensible authentication protocol (Varghese & Buyya, 2018). It is
embedded with the capability to run on LAN due to its simple encapsulation. The
authentication conversation gets completed by the three components that define EAPol.
5.5 What is the function of IEEE 802.1X?
According to Rittinghouse & Ransome (2016), this is an important network
authentication tool with the mandate of opening ports for accessing the network, considering
that a firm allows a user to access a network. Authentication to access the network gets
confirmed by the RADIUS server based on the client’s certificate or credentials. IEEE 802.1X
acts as a channel for authentication passage; they do not care about the switches and access
CLOUD COMPUTING
4
points since the authentication servers are the one tasked with the proliferation of client
credential verification.
5.6 Define cloud computing.
The component of using hardware and software computing paradigms to ensure service
delivery is cloud computing. Google Gmail is an example of an organization that offers cloud
services. Cloud computing comprises a reliance on combined computing res...