Page 262 - DCAP311_DCAP607_WIRELESS_NETWORKS
P. 262

Wireless Networks




                    Notes          14.7 Summary

                                   Building  a  strong  user-authentication  architecture  requires  focus  beyond  just  improving  the
                                   credential-verification component.
                                   The overall architecture might include additional aspects, such as a layered system that is driven
                                   by risk-based analytics, which enables an adaptive authentication system.
                                   Also, the design of an authentication approach should be weighed against various requirements,
                                   such as data (that is, availability, confidentiality, integrity, accountability, and so on), identity
                                   assurance, usability, compliance and auditing, portability/scalability, manageability, and user-
                                   community dynamics.
                                   More importantly, however, just the same as other security initiatives, strong user authentication
                                   also requires a carefully planned, well-balanced, and concerted approach across the entire IT
                                   architecture to ensure a consistently secure environment.

                                   With the growing adoption of cloud-based services, consumer-identity metasystems, and mobile
                                   devices, while attack methods gain maturity and sophistication, the future outlook for strong
                                   user authentication is set for many innovative developments.

                                   However, implementing strong user authentication often is not a straightforward task, as projects
                                   have myriad options from which to choose, a multitude of trade-offs to consider, and a cluster of
                                   intricacies to manage.
                                   Defined by  the Institute of Electrical and Electronic Engineers (IEEE) with the 802.3 standard,
                                   Ethernet has provided an evolving, cooperative, scalable and interoperable networking  standard.
                                   Media Access Control (MAC) technology provides unique identification and access control for
                                   computers on an Internet Protocol (IP) network.
                                   Cryptography forms a fundamental part of message security.
                                   Without public key cryptography, it is doubtful that there would be practical message security
                                   solutions, due to the fact that key management before public key cryptography was cumbersome.
                                   The purpose of 802.1x is to accept or reject users who want full access to a network using 802.1x.
                                   Data security includes the mechanisms that control the access to and use of the database at the
                                   object level.

                                   14.8 Keywords

                                   Address Resolution Protocol  (ARP):  ARP  converts an  Internet  Protocol (IP) address  to its
                                   corresponding physical network address. ARP is a low-level network protocol, operating  at
                                   Layer 2 of the OSI model.
                                   Authentication: Authentication is a process which a user gains the right to identify himself.
                                   Cloud  Computing:  Cloud  computing  is  a  colloquial  expression  used  to  describe  a  variety  of
                                   different  computing  concepts  that involve a large number of computers  that are connected
                                   through a real-time communication network (typically the Internet).
                                   Cryptography: Cryptography is the study of protecting information through the use of codes and
                                   ciphers.
                                   Extensible Authentication Protocol (EAP): [EAP is] an authentication framework which supports
                                   multiple authentication methods. EAP typically runs directly over data link layers such as Point-
                                   to-Point Protocol (PPP) or IEEE 802, without requiring IP.






          256                              LOVELY PROFESSIONAL UNIVERSITY
   257   258   259   260   261   262   263   264   265