Security Solutions
3-11
Designing Access Controls
Comprehensive Security Policy
laptops. Resource endpoints consist of databases, specialized server
clusters, the supercomputer, and other high-end computing components.
The endpoints run a variety of OSs, including Linux, UNIX, and some
Berkeley Software Division (BSD)-based systems.
■ Remote access—Faculty members access PCU’s LAN from home (or
while away on sabbatical) via a virtual private network (VPN). (Students
can access their email from home via HTTPS. Because these students are
accessing resources on a Web server, this doesn’t constitute network
access and is not discussed in this chapter.)
From this evaluation, the IT staff divides the campus and the network into
network access zones. (For more information about network access zones,
see Chapter 2: “Customer Needs Assessment.”)
Figure 3-2. PCU Campus Zones