About This Chapter
Network Authentication - Chapter Summary
You can work at your own pace as you study the lessons on network authentication in this chapter. Subjects covered include access control matrices, biometric security, network access protection (NAP) and smart cards. Each lesson is accompanied by a short quiz you can use to assess your knowledge of these concepts. Help from one of our experts is available in the Dashboard if you have questions. Once you finish this chapter, you should be able to do the following:
- Detail the processes involved in capturing network traffic
- List the types and functions of network interface cards (NIC)
- Explain the function of a domain controller
- Outline Kerberos encryption types
- Identify different types of virtual private networks (VPNs)
- Discuss the protocols and types of VPN encryption
- Describe the solutions and devices of a security perimeter
- Compare information and data dissemination
- Differentiate between different types of risk and their contingency plans
- Outline IT disaster and recovery plans
1. Access Control Matrix: Model & Example
An access control matrix is a single digital file assigning users and files different levels of security. We'll talk about access control models including: mandatory access, role-based access, discretionary access, and rule-based access.
2. What is Biometric Security? - Definition, Systems & Devices
Biometric security devices measure unique characteristics of a person, such as voice pattern, the iris or retina pattern of the eye, or fingerprint patterns. With biometrics, it can be extremely difficult for someone to break into a system.
3. What is Network Access Protection (NAP)?
In this lesson,we will be examining the vulnerabilities posed to a corporate network by remote connections and understand the role of Network Access Protection in remote authorised connections.
4. Smart Cards: Definition, Uses & Examples
Smart cards offer a slightly different way to pay for your purchases, while protecting your valuable personal information. In this lesson, you'll learn more about smart cards and how they're used.
5. Capturing Network Traffic: Definition & Processes
When talking about computers or the internet you must have heard the term network traffic. What exactly is network traffic? How can you monitor and filter it? In this lesson we will learn some of the basic concepts of network traffic.
6. Network Interface Card (NIC): Types, Function & Definition
To connect to a network, a computer uses a network interface card (NIC). A NIC controls the wired and wireless connections of a computer to exchange information with other computers and the Internet.
7. What is a Domain Controller? - Definition & Function
In today's digital world, everything has a password. You need a password to access your computer and shared resources at work. In this lesson, we'll learn about managing passwords in a networked environment through the use of domain controllers.
8. Kerberos Encryption Types
Security is important in today's world. Events such as the Olympics bring it front and center. In this lesson, we'll take a look at Kerberos Encryption and the encryption types associated with it.
9. What Is a Virtual Private Network (VPN)? - Definition & Types
A virtual private network (VPN) provides a way to use network resources securely in a remote manner. In this lesson, we'll cover why we use VPNs, what types of VPNs are used, and what is necessary in order for VPNs to work.
10. VPN Encryption: Types & Protocols
VPN (Virtual Private Network) encryption is used to ensure secure communications over data networks. In this lesson, we'll look at some of the different protocols that make up a VPN and the types of encryption that are used within a VPN.
11. Security Perimeter: Definition, Solutions & Devices
In this lesson, you will learn the definition of security perimeter. Additionally, you will learn about the devices, equipment, and technologies used to secure a network's perimeter.
12. Intranet and Extranet: Comparing Information and Data Dissemination
Organizations rely upon intranets and extranets to share information, communicate with employees, suppliers and customers, and enable collaboration on projects. This lesson explains how intranets and extranets work. It introduces the topics of virtual private networks, tunneling and firewalls.
13. Types of Risk & Creating Contingency Plans
This lesson discusses various types of risk, including variance, contingency risk, and unknowns. We also explore the need for a risk contingency plan for each project that a company undertakes.
14. IT Disaster Planning & Recovery
In this lesson we will learn about Disaster Recovery Plans (DRP) for recovering data and infrastructure in case of an Information Technology (IT) system failure.
Earning College Credit
Did you know… We have over 200 college courses that prepare you to earn credit by exam that is accepted by over 1,500 colleges and universities. You can test out of the first two years of college and save thousands off your degree. Anyone can earn credit-by-exam regardless of age or education level.
To learn more, visit our Earning Credit Page
Transferring credit to the school of your choice
Not sure what college you want to attend yet? Study.com has thousands of articles about every imaginable degree, area of study and career path that can help you find the school that's right for you.