Reference no: EM132324547
Assignment: Part 1: 1. Design a holistic physical security plan
2. Choose a biometric identity verification system
3. Understand how ACLs and ACEs are related
4. Understand authentication factors
5. Understand kerberors and Kerberos-trusted key distribution center KDC
6. Identity layers 2 and 3 technique for network access control
7. Plan for single-sign on access control
8. Apply best practices to access control in an enterprise environment
Part 2: 1. Create guidelines and procedures based on standards and policies
2. Compare various multilayers access controls
3. Tighten security for access to web servers
4. Understand the difference between RADIUS and TACACS+ protocol
5. Discuss remote authentication protocols
6. Understand internet security protocol
7. Use best practices when implementing a remote access control system.