--%>

Access control list or ACL

ACL (Access control list): In order to control the access to a particular number of users the wireless network makes use of ACL which is access control list. In this the unique address of the clients or the users are used and hence a check can be put as to which user is using the net. If the address of the user is not there in the list of legitimate users, access is denied. The control list behaves in a way very similar to a guest list in a party where only a limited number of guests are invited and only by showing the identification, they are verified from the guest list with the security guards and allowed to enter the party.

   Related Questions in Computer Network Security

  • Q : Critics of online communities The

    The Critics of online communities discuss that there is very big potential for deceit in online relationships in comparison to face-to face ones. Explain the advantages or disadvantages of having the capability to represent yourself differently in an

  • Q : What is triple encryption Explain the

    Explain the term triple encryption?

  • Q : What is message authentication Explain

    Explain what is meant by the term message authentication? Describe the classes of message authentication function.

  • Q : Threat Statement Define the term Threat

    Define the term Threat Statement and what are their consequences?

  • Q : Explain LAN security in an Organization

    Introduction: The companies are able to deploy wireless LAN easily as the communication mode is wireless and hence no physical cables are put to use and drawing physical cable throughout the building incurs more time as compared to wireless LAN. With

  • Q : LAN and WAN components LO5: Design a

    LO5: Design a small routable network comprising LAN and WAN components Overview This case study based assignment assesses the student's ability to design the logical and physical netw

  • Q : Access control list or ACL ACL (Access

    ACL (Access control list): In order to control the access to a particular number of users the wireless network makes use of ACL which is access control list. In this the unique address of the clients or the users are used and hence a check can be put

  • Q : Cloud computingb security syntheses +20

    syntheses +20 paper +5 figures starting from introduction until conclusion

  • Q : Advantages of ReefEdge technology

    Advantages of ReefEdge technology: The advantages of using the ReefEdge technology by an organization are listed below: The system captures the identity of the user who is going to use the system. Therefore the acc

  • Q : Middle portion of 3DES Explain middle

    Explain middle portion of the 3DES a decryption rather than the encryption?