Mile2 Cybersecurity Institute

Reply To: OCU C)OST A Discussion Lesson 08

#111712
Hannah Street
Participant

Networks can be vulnerable in a number of different ways including insecure technologies, physical environment, and weak documentation. Each one of these can cause the network to be vulnerable in a number of different ways. While networks can be vulnerable there are also a few different practices that can be put into place in order to try to prevent things going wrong with a network. There are a few different ways that access control can help prevent vulnerability in networks. Authentication can be very helpful in keeping track of who is accessing the network as well as only letting them have access to what they are supposed to. Multifactor authentication means that the user needs 2 different ways of authenticating their identity in order to login in. On the flipside, there is also single sign on, this requires signing in one time and it allows access to the group of services. The last thing that can be used to protect a network is an access control list, which can be used to prevent users from accessing unwanted websites that can damage the network. (Mile 2).
References:
Mile 2. (n.d.). Certified Operating Systems Technician.

SUPPORT

Please Note:

The support ticket system is for technical questions and post-sale issues.

 

If you have pre-sale questions please use our chat feature or email information@mile2.com .

Privacy Overview
Mile2 Cybersecurity Institute

This website uses cookies so that we can provide you with the best user experience possible. Cookie information is stored in your browser and performs functions such as recognising you when you return to our website and helping our team to understand which sections of the website you find most interesting and useful.

Strictly Necessary Cookies

Strictly Necessary Cookie should be enabled at all times so that we can save your preferences for cookie settings.