
Designing Access Controls
Choose the Access Control Methods
Example
For example, PCU, like all universities, has a very low risk tolerance. The PCU network stores confidential information about both students and faculty. In addition, the faculty stores curriculum and tests on the network. The univer- sity cannot afford to have any of this information stolen.
When factoring in only security, the PCU network administrators select the access control methods shown in Table
| Table | Selecting an Access Control Method Based on Security Needed | ||
|
|
|
|
|
Factor | Private Wired | Public Wired | Private Wireless | Public Wireless |
|
|
|
|
|
Security | 802.1X | 802.1X | 802.1X with WPA/ | 802.1X with WPA/ |
|
|
| WPA2 | WPA2 |
|
|
|
|
|
User Type and Sophistication
Which users are connecting to the network, and what level of expertise do they have?
Based on your needs assessment, you have identified the users who are accessing the network in each zone. You have also determined their level of technical expertise, so you know:
■Which users are technical novices and may require help if you select a complex access control method
■Which users are knowledgeable and
You might find it useful to group users into three general categories, as outlined in Table
Table 3-5. Level of Technical Knowledge
Technical Knowledge | Characteristics |
Low (unsophisticated) | Little or no technical |
| things to work. |
Medium (somewhat sophisticated) | Some technical |
| to deal with minor issues. |
High (very sophisticated) | Expert |
| of their computer environment. |
|
|