Controlling and monitoring access to the intranet, Computer Networking

Assignment Help:

Controlling and monitoring access to the Intranet

Digital certificates provide excellent means of controlling and monitoring access to the Intranets. The certificate itself acts as a token for access control. The user must present it in order to access the Intranet or Internet site. The certificate could contain a series of digits and alphabets combined together. The best example can be the use of cash card or the prepaid mobile phone card. The customer pays for the required number of hours of mobile phone usage well in advance and scratches the card to obtain the "certificate". The customer then connects to the Intranet site of the phone company by dialing it and then enters the "secret" code. Upon entering this code, the phone company updates the usage records and permits the customer to use the services for the extended period.

 


Related Discussions:- Controlling and monitoring access to the intranet

Hardware component used to store buffers, Recognize the hardware component ...

Recognize the hardware component used to store buffers, tables, running-configuration etc? Ans) RAM is the dynamic memory area. ROM have the boot strap code, NVRAM have the star

Network, network diagram which must include at least 2router,2bridge and 4 ...

network diagram which must include at least 2router,2bridge and 4 switches and must have different protocols and different cable...?

Explain categorization according to pipeline configuration, Categorization ...

Categorization according to pipeline configuration According to the configuration of a pipeline, the below categories are recognized under this classification: Unifunct

What are tp-lite, What are TP-Lite and TP-Heavy Monitors? TP-Lite is si...

What are TP-Lite and TP-Heavy Monitors? TP-Lite is simply the integration of TP Monitor functions in the database engines. TP-Heavy is TP Monitors which handles the Client/S

What is osi and what role does it play in computer networks, What is OSI an...

What is OSI and what role does it play in computer networks? OSI (Open Systems Interconnect) serves as a reference model for data communication. It is made up of 7 layers, with

What is cryptography, The science and art of manipulating messages in order...

The science and art of manipulating messages in order to create them secure is known as cryptography..... Two types are:- Symmetric key cryptography and Asymmetric key crypto

Lan hardware and packet filtering, LAN HARDWARE AND PACKET FILTERING: ...

LAN HARDWARE AND PACKET FILTERING: The diagram below explain the LAN hardware LAN INTERFACE:  LAN interface operates all details of frame reception and transmis

Define the term - store-and-forward and cut-through switch, Store-and-forwa...

Store-and-forward switch  The layer 2 switch accepts a frame on an input line, buffers it briefly, and then routes it to the appropriate output line. Cut-through switch

TCP, TCP creates a reliable data transfer service, in addition to IP''s unr...

TCP creates a reliable data transfer service, in addition to IP''s unreliable best-effort service. Study the related sections of the text, and in your own words, summarize how TCP

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd