5.1 Network Access Control
This protocol means the solution in computer networking that applies a set of aspects in defining and implementing policies that describe the modes of securing network node access via various device systems in the initial attempt to access this network. The basic form used in describing network access control is 802.2X standard. It is the strategy used in the management and security of a network and is majorly used to enforce compliance, management, and policies in access control to the particular network. Its other role is monitoring and controlling activities when users and devices are using a network (Trevor J. Dildy.,2016).
This abbreviation in full is Extensible Authentication Protocol and entails an authenticating framework mainly applied in WLANs. Also, it can mean a framework of universal authentication whose definition may be via RFC3748 and whose updates are through RFC5247. In addition, there various EAP methods which are proposed for different specific usages. However, they have similar features in that the user has to submit to the security association, then to the neighbouring access point and finally deliver it for identification of the validity via authentication authorization accounting (AAA) which serves all the sides involved (Eva Webster., 2005).
5.3 EAP Authentication Methods
Their several EAP methods. EAP-TLS employs authentication that is based on the certificate. Instead of sending the credentials to RADIUS servers via air, they can enrol a certificate towards the RADIUS server that authenticates it. EAP-FAST helps in securing communication among the servers and peers by applying the transport layer security in developing a mutually authenticated channel. PEAP-MSCHAPv2, here the client enters credentials, sends them to a RADIUS server, verifying them for authentication to access a network. EAP-PEAP is employed in wireless networks, particularly those used worldwide. Its security is promoted by deploying and configuring it properly (Eva Webster., 2005).
In full, it is an Extensible Authentication Protocol over LAN. Furthermore, it is an authentication protocol applied in 802.1X (IpCisco., 2021).
5.5 IEEE 802.1X
Its function is used in the provision of an authentication mechanism in systems intending to be fixed to WLAN or LAN. 802.1X enhances it in defining the authentication controls for devices and users when trying to access LAN or WLAN (CARNEVALE, B., 2017).
5.6 Cloud Computing
It entails the delivery system used in computer services. They may include; storage, networking, intelligence and software analytics. The use of the internet is described as the cloud in offering fast innovation, scale economies, and flexible resources (Microsoft Azure).
5.7 Cloud Service Models
Platform as a service; supplies the on-demand environment in delivering, managing, testing and developing software applications. It eases the developers’ practices in creating mobile apps and webs. Serverless computing is a model that focuses on developing app functionalities in the shortest time possible. This model is event-oriented and highly scalable and uses resources only after a particular function occurs. Software as a service model is used in distributing software applications based on subscription, on-demand and over the internet (Microsoft Azure).
5.8 Cloud Computing Reference Architecture
It is a protocol meant to be used as a blueprint for cloud implementations architecting and is driven by a particular cloud implementation’s non-functional and functional requirements. It defines the basic building blocks, which may be the architectural elements with their related aspects; together, they develop the cloud (Liu et al., 2012).
5.9 Cloud-specific Security Threats
Security issues in cloud computing and services may come in various form. Among them is the cloud threats in the form of problem disrupting service availability like distributed denial of service attack that risks the availability of services pertaining unauthorized bandwidths because of increased service charges. In addition, other security issues impact data storage due to the several severe attacks that affect the systems involved and may lead to data leakage to unauthorized systems (Abdurachman et al., 2019).
Abdurachman, E., Gaol, F. L., & Soewito, B. (2019). Survey on threats and risks in the cloud computing environment. Procedia Computer Science, 161, 1325-1332.
Liu, J., Zhang, L. J., Hu, B., & He, K. (2012, June). CCRA: Cloud computing reference architecture. In 2012 IEEE Ninth International Conference on Services Computing (pp. 657-665). IEEE.
Microsoft Azure. (n.d.). What is cloud computing? A beginner’s guide. Retrieved from https://azure.microsoft.com/en-us/overview/what-is-cloud-computing/
IpCisco. (2021, February 8). EAPoL | 802.1X | Extensible authentication protocol over LAN ⋆ IpCisco. Retrieved from https://ipcisco.com/lesson/eapol-extensible-authentication-protocol-over-lan
CARNEVALE, B. (2017). ADVANCED ELECTRONIC SYSTEMS DESIGN FOR AUTOMOTIVE NETWORK SECURITY
Eva Webster. (2005, September 21). What is extensible authentication protocol (EAP)? – Definition from WhatIs.com. Retrieved from https://searchsecurity.techtarget.com/definition/Extensible-Authentication-Protocol-EAP
Trevor J. Dildy, CCNA. (2016, July 1). Network access control: Has it evolved enough for enterprises? Retrieved from https://www.isaca.org/resources/isaca-journal/issues/2016/volume-4/network-access-control-has-it-evolved-enough-for-enterprises