Network Access Control for Government: An Analytical Study

Network Access Control for Government: An Analytical Study

Nathalie Ayala Santana, Ayad Barsoum
Copyright: © 2022 |Pages: 11
DOI: 10.4018/IJCRE.309686
OnDemand:
(Individual Articles)
Available
$37.50
No Current Special Offers
TOTAL SAVINGS: $37.50

Abstract

In the digital era, governments are considered high-value targets, chased not only by financially motivated criminals, but also to commit acts of espionage, terrorism, and warfare. One of the most important technologies developed is network access control (NAC), which implements policy-based access control to handle entry to the network. This research focuses on the application of network access control in government institutions and the numerous benefits of its adoption. Exploring the challenges of the government to adopt a budget that places cybersecurity as a priority will allow analyzing if the solutions offered in the market are achievable for big cities as well as for small cities. This paper explores the budgets of six cities, and three NAC solutions are offered to help the government increase its cybersecurity and comply with regulations.
Article Preview
Top

Background

It is important to understand what Network Access Control is, how does it work, and how it is being implemented in the Government.

Network Access Control

It is considered a protocol, tool, or mechanism that helps with the management of the security entry to devices that try to connect to a network. NAC is implemented to help in many security aspects such as Intrusion Detection System (IDS), Intrusion Prevention System (IPS), antivirus, host or gateway firewall, users or system authentication, and network security enforcement. One of the most important aspects to mention about NAC is that before the access it checks the security of the endpoint, and policy compliance, and after the access is granted, it controls the location and behavior.

NAC oversees two types of assessments: user authentication and device compliance evaluation. The access is controlled using predefined role-based access policies with an AAA (Authentication, Authorization, and Accounting) solution. However, technology is always evolving, NAC solutions also have grown to include guest access management, bring your own device (BYOD) management, security for IoT devices, and fingerprinting capabilities to identify the make and OS of endpoint devices. Most NAC architectures are based on 802.1x, Extensible Authentication Protocol (EAP), EAP over LAN (EAPoL), 802.11i, 802.11w, and Remote Authentication Dial-In User Service (RADIUS) protocols (Parhi, 2012).

Complete Article List

Search this Journal:
Reset
Volume 5: 1 Issue (2024)
Volume 4: 2 Issues (2022): 1 Released, 1 Forthcoming
Volume 3: 2 Issues (2021)
Volume 2: 2 Issues (2020)
Volume 1: 2 Issues (2019)
View Complete Journal Contents Listing