Sunday, November 24, 2013

Users enter information system via a communication network. Potential entry point communication fla

Management of mobile devices in the Information System (IS) |
Information Services, an organization needs for its operations must be provided at all times. This is one of the basic guarantees provided by the organization and operation of today expect and require from the information system. Due to the dynamics of the modern way of working is becoming increasingly important as location independence. Initially, we enable location-independent within commercial buildings. From a technological point of view, this enables us laptops and extension of the wired local network to wireless. VPN technology have enabled us to that we have over a public communications network with your computer flat rack container into our information system securely connect from home. The same services we have been allowed even where we have available a physical connection to the Internet. The advent of mobile communication technologies, it is removed by the end of locational restrictions on access. For Slovenia, we can say that the signal coverage of mobile telephony excellent. So we can be "on-line" regardless of where we are. New conditions very quickly adapts to market personal systems. All topical becoming portable personal computers, and recently also tablet computers and smart phones. In 2011, there was a tipping situation where the number of mobile devices sold exceeded the number of traditional desktop and laptop PCs. Gartner flat rack container in 2012 puts tablet computers and smartphones in the first place rankings of the most important strategic technology areas.
If it was so far the usual MS Windows platform operating system desktop and laptop computers, but today in the context of tablet computers, smart phones and other mobile devices face new operating platforms such as iOS, Android, Symbian etc.. From "comfortable" user Windows environment, which has a range of high-quality and effective tools to control and manage, so we are moving in multiplatformno heterogeneous user environment. In terms of management information system with the emerging challenges regarding the management of such an environment. One of the challenges is certainly control access to the information system.
Users enter information system via a communication network. Potential entry point communication flat rack container in the information system are local wired network, a wireless local network and the gateway via a public communications service provider. We are interested in how these entry points effectively and easily monitored in terms of access users and user devices. The most common solution on the market that address these issues, as they are known by the name of NAC (Network Admission Control), NAP (Network Access Protection), ISE (Identity Service Engine) and others. Latest solutions that are currently under development, enabling even tracking user identities across all devices in a communications network information system, and thus also of exercising security policy in all these communication points.
A first presents the process of authentication or. authentication (Authentication), or where the user. device that wishes to enter into the information system, flat rack container deliver your identity. It can be made with a username flat rack container and password, flat rack container which can be permanent or disposable (OTP - One Time Password). Identity may be presented with a certificate of the appliance. user. There are also biometric identity, such as fingerprint, iris, etc.. A second outlines the procedure for the authorization or. authorization (Authorization). Devices and users that have access to the information system is granted, the level of communication access points applied pre-defined security policy.
Most of these access control mechanisms require standardization clients. This means that it must be the ultimate device properly configured application flat rack container that allows the execution of the specified authentication process. Such a method is therefore particularly suitable for a pre-known corporate users and users of partner companies who regularly access our information system.
Basic access control mechanisms dealing with access to an information system for travelers or business. organizations. It is the unknown devices and users that due to security reasons, usually only offer access to the public Internet network. If we have a company organized process of granting temporary user accounts business guests, then talk about the traced access for guests, which can be implemented authentication process via the web portal. When the allocation process invoices can not be guaranteed and carried out nesledeni access for guests. Because their personal systems are not properly adjusted, they can not successfully flat rack container complete the prescribed procedure of authentication, so they easily isolated at the level of the communication network, where they are assigned only access to the Internet network

No comments:

Post a Comment