United Kingdom Healthcare System

Technology Essay on Access Controls over A LAN

Access Controls over A LAN

Access controls widely used in LAN networks


This is a control model that enables network users to encrypt information so that no one else read. The feature normally is accompanied by cryptographic key; therefore, the only user with the key can decrypt the details to get full access. Therefore, the encryption offers stronger and advanced access protection.

Secure firewalls

This is a control model that filters and prevents access between two different networks for instance, contractors, intranet, internet, institutions of higher learning and others. Secure firewalls also permit internal users to explore exterior networks while securing internal systems. In the event of such, any illegal intruder is blocked out of the internet.

MAC authentication

This is a control strategy that enables users to access the network by authenticating the source Media Access Control address to the utilized port. The feature doesn’t require the software of the client while owners do not need a password or a username to access the network. The appliance leads to authentication of MAC procedure after detecting any MAC address strange source on the networking port. Therefore, only one user can pass the confirmation access to the network.

Less useful controls

Assigning a static IP address

This kind of control has been utilized in many homes that need IP address. Generally, an IP address is configured on access points or the router after by the Dynamic Host Configuration Protocol (DHCP) is turned off. Afterwards, every other instrument that is connected is also organized to match with the router. This is a very weak way to control network access because intruders can easily access IP address from the network.

Turning off the network when not in use

This is a method that is usually utilized in wireless networks where a user shuts down the network if not in use. Hackers therefore cannot access the network when shut but in the long run, computer hard drives break down because of the deterioration of power cycle.

Considerations one may have in mind

I would love to apply an access control system in my organization to prevent any unauthorized use of network resources. The system will be designed to grant authorized users only access to the internet as well as its resources. To cope with the best network access control method, I will have to consider the following factors

  • Eavesdropping susceptibility
  • Exposure to intruders
  • Integrity of clients
  • Network segmentation

Posted by:


Related articles

list of articles



  • Sample Essay on SWOT Analysis of The Home Depot January 20, 2016
    SWOT Analysis of The Home Depot SWOT analysis of The Home Depot is among the best tools used by the home improvement retailer to gauge its ability to stay afloat and profitable in the market. Although it is considered the largest home improvement retail chain in the world with an estimated revenue base on more […]


Latest News From Blog

Check out Our Blog's assignment samples and tips on how to Write Assigments
Essay sample on the Effects of Cold War on Soviet Union..

Effects of Cold War on Soviet Union The Soviet Union was one of the main participants in the Cold War. It was engaged in the war with the USA and - See more

Essay sample on Effects of Cold War on Asia

Effects of Cold War on Asia Tensions of the Cold War began shifting from Europe to Asia in 1949 when Mao Zeodong proclaimed the birth of the ...Read More

Sample Essay on United Kingdom Healthcare System

United Kingdom Healthcare System United Kingdom healthcare system, also known as the National Health Service was established...Read More

Back to Top