Security Solutions

3-9
Designing Access Controls
Comprehensive Security Policy
Figure 3-1. Diagram of the PCU Campus
Until now, the network administrators have used a Lightweight Directory
Access Protocol (LDAP)-compliant directory to control access to data and
applications, but they have not enforced access control at the port. The lack
of security has made the network vulnerable, and several problems have
occurred. For example, many students’ workstations and laptops have been
infected with viruses and other malware from the Internet, and unfortunately,
a few of the students themselves have created and spread malware. There
have also been rumors of students breaking into the student records database
and altering grades.
The PCU IT staff has decided to implement strong access control methods and
to use endpoint integrity checking to ensure that endpoints are up-to-date on
their security patches and plug-ins.