Methodological guide to develop Access control politics by using Cisco´s Network Admission Control platform at Universidad Autónoma de Bucaramanga

  • Alexa M. Ramírez A. Universidad Autónoma de Bucaramanga
  • José G. Hernández Universidad Autónoma de Bucaramanga
Keywords: Security, Telematics, Security politics, Telecommunications, Diagnostic, Methodological guides, Network's access control

Abstract

The investigation below was made to show the importance of developing access control politics in organizations which are used to control the access of every single device that try to get a connection to company’s networks and by this way get the solution to protect their data, information and even their reputation. You will find security´s concepts on this document, access control and network´s control focusing on the own solution of cisco network assett collector as an emphasis to develop and design a proposal about a methodological guide to develop access control politics at Universidad Autonoma de Bucaramanga. This guide is divided into eight phases which let you know and understand the solutions for cisco. The technical requirements about software and hardware related and finally the general politics we must consider when setting CNAC.

Author Biographies

Alexa M. Ramírez A., Universidad Autónoma de Bucaramanga

Estudiante en la Maestría en Telemática de la Universidad Autónoma de Bucaramanga.

José G. Hernández, Universidad Autónoma de Bucaramanga

Docente de la Universidad Autónoma de Bucaramanga.

References

[1] V. Frias-Martinez, S. . J. Stolfo y A. D. Keromytis, «Behavior-Based Network Access Control: A Proof-of-Concept.,» de Information Security, Springer-Verlag Berlin, 2008, pp. 175-190.

[2] Cisco Networking Academy, CCNA Exoloration 4.0 accediendo a la wan, 2009.

[3] International Organization for Standardization - ISO, «ISO/IEC 27001 - Information security management,» 2013. [En línea]. Available: http://www.iso.org/iso/home/standards/management-standards/iso27001.htm.

[4] M. Nakhjiri y N. Nakhjiri, AAA and Network Security for Mobile Access: Radius, Diameter,EAP,PKI and IP Mobility., 2005.

[5] J. Carreño Gallardo, «Seguridad en Redes Telemáticas,» McGraw-Hill, 2004, pp. 35-36.

[6] Cisco, «Cisco,» 2014. [En línea]. Available: http://www.cisco.com/en/US/products/ps6128/index.html.

[7] International Organization for Standardization - ISO, «ISO/IEC 27005:2011,» 2011. [En línea]. Available: http://www.iso.org/iso/home/store/catalogue_tc/catalogue_detail.htm?csnumber=56742.

[8] Information Commisioner's Office-ICO, «Bring your own device (BYOD),» 2014. [En línea]. Available: https://ico.org.uk/media/for-organisations/documents/1563/ico_bring_your_own_device_byod_guidance.pdf.

[9] Information Security Media Group, «Mobile: Learn from Intel's CISO on Securing Employee-Owned Devices,» 2016. [En línea]. Available: http://www.govinfosecurity.com/webinars/mobile-learn-fromintels-ciso-on-securing-employee-owned-devices-w-264.

[10] L. Spandas, «Citrix favours selective BYOD program,» 2012. [En línea]. Available: http://www.zdnet.com/article/citrix-favours-selective-byod-program/.

[11] O. Rege, «Bring Your Own Device: Dealing With Trust and Liability Issues,» 17 Agosto 2011. [En línea]. Available: http://www.forbes.com/sites/ciocentral/2011/08/17/bring-your-own-device-dealing-with-trust-and-liability-issues/#7cf605625182.

[12] K. Johnson y B. L. Filkins, «SANS Mobility/BYOD Security Survey,» Marzo 2012. [En línea]. Available: http://www.sans.org/reading_room/analysts_program/mobilitysec-survey.pdf.

[13] D. A. Wills, «Bring Yout Own Device: The Facts and the Future,» 2013.

[14] Novenca Security Systems, «Control de Acceso,» 2015. [En línea]. Available: http://www.novenca.com/site/index.php?option=com_content&view=article&id=86&Itemid=164.

[15] Creative Commons Attribution Share-Alike 3.0 License, «Control de acceso criptográfico,» 2016. [En línea]. Available: https://galiciacuamatzi.wikispaces.com/4.4+Control+de+acceso+criptogr%C3%A1fico.

[16] A. Córdoba Téllez y G. Durán Martínez, «Diseño de un sistema de control de acceso con Radius configurado en un sistema operativo Linux para una LAN inalámbrica,» México, 2010.

[17] Cisco, «Cisco IOS and NX-OS EOL Redirect page,» 21 Junio 2013. [En línea]. Available: http://www.cisco.com/c/en/us/td/docs/ios/redirect/eol.html.

[18] Cisco System, Inc, «802.1X,» 2014. [En línea]. Available: http://www.cisco.com/c/en/us/tech/lan-switching/802-1x/index.html.

[19] Cisco Systems, Inc, «Cisco Trust Agent 2.0,» 2005. [En línea]. Available: http://www.cisco.com/c/en/us/products/collateral/security/trust-agent/product_data_sheet0900aecd80119868.html.

[20] Cisco Systems, Inc, «Cisco Secure Access Control Server Solution Engine,» 2006. [En línea]. Available: http://www.cisco.com/c/en/us/products/security/secure-access-control-server-solution-engine/index.html.

[21] Cisco Systems, Inc, «Chapter: Posture Validation,» 7 Noviembre 2013. [En línea]. Available: http://www.cisco.com/c/en/us/td/docs/net_mgmt/cisco_secure_access_control_server_for_windows/4-2/user/guide/ACS4_2UG/PstrVal.html#wp134759.

[22] E. Feitosa, L. Oliveira, B. Lins y A. M. Junior, «Security information architecture for automation and control networks.,» 8th Brazilian Symposium of Information Security and Computer Systems, pp. 17-30, 2008.

[23] A. Westin, «Privacy and Freedom,» 3 1 1968. [En línea]. Available: http://scholarlycommons.law.wlu.edu/cgi/viewcontent.cgi?article=3659&context=wlulr.
How to Cite
Ramírez A., A. M., & Hernández, J. G. (2017). Methodological guide to develop Access control politics by using Cisco´s Network Admission Control platform at Universidad Autónoma de Bucaramanga. Revista Colombiana De Computación, 18(1), 46–60. https://doi.org/10.29375/25392115.3197

Downloads

Download data is not yet available.
Published
2017-06-01
Section
Article of scientific and technological research

Altmetric

Escanea para compartir
QR Code
Crossref Cited-by logo

Some similar items: