70 likes | 183 Vues
Viruses, worms, and botnets can infiltrate networks through unsuspecting users, often leading to serious security breaches. This document explores the unique challenges of protecting a network from its own users, highlighting common scenarios such as disabled antivirus software and unauthorized guest access. It discusses practical strategies for safeguarding your network while accommodating user needs and guest access, ensuring a secure yet flexible environment. Learn how to effectively manage user permissions and mitigate risks while maintaining network integrity.
E N D
Network Access Control MSIT 458 – The Chinchillas
The Problem Viruses, worms, and botnets are often spread by unknowing victims. These victims may be your own network users. How can the network be protected from your own users?
The Problem Hey Trudy! I disabled McAfee just like you told me to!! We still on for our date tonight? Does Bob work for your company? How would you handle this situation?
The Problem Thanks for the open access to your network! I swear I won’t touch anything! How do you handle guests on your network? How much access, if any, is appropriate?