Levels+Of+Access

ABILITY TO IMPLEMENT DIFFERENT LEVELS OF ACCESS
A **computer network** is composed of multiple connected [|computers] that communicate over a wired or wireless medium to share data and other resources. For instance, a home computer network may consist of two or more **computers** that share files and a printer using the network. The size and **scalability** of any computer network are determined both by the physical medium of communication and by the software **controlling** the communication (i.e., the [|protocols]).

The type of **access** referred to in this article is the ability to gain **entry** to a database or other digital information. Having access to a network means that you are able to enter the network, **use** it to store data, copy documents, etc. In brief, you have to possibility to make changes to the files in the network. However, just because you are able to **connect** to a network or have access to it, it doesn't mean that you have full access, as you would not have access to the 'Reports' file in ISD's 'File Server'.

Computer networks have different levels of access. This means that a number of people can use and share files through the same server such as our own ISD File Server, but some files are restricted to students such as 'Yearbook 2006-2007' unless you are part of the Yearbook group and have been given access to it. True enough it is sometimes annoying to find that you have not got access to certain files, and you may even feel that you are not like the other who have access to it. But then again, this ability to implement different levels of access is great because it secures the network, as well as certain files and folders from suspicious individuals.

For example, if someone wanted to hack into the Yearbook folder in order to copy the photographs of all the students and sell them to a magazine, he or she would not be able to, unless they actually had access to the folder. It seems very easy to secure such folders, but we should keeo in mind that hackers know how to alter folder options and can easily enter an unaccessible folder or file. Therefore, the security of certain files and folders depends on the individual's intentions.


 * ARTICLE:**

This article by Steve Hanna discusses the developments and trends of the Network Access Control (NAC), which, according to the journalist, has come a long way in the last few years - from prototype to product to deployment. The author states the changes in technology make it hard for users of this network access control to keepitgs » Levels Of Access up. Concepts, standards and the future of Network Access Control are also included, which makes it easier to understand what NAC is all about.
 * [|Next Steps for Network Access Control]**

= = = = Just when it looked like the FCC's upcoming auction of 700 MHz spectrum might inject some degree of openness into the U.S. wireless industry, Verizon (VZ) Wireless struck back with this lawsuit. Will the auction still take place? It's pretty obvious that Verizon Wireless is scared by the prospect of Google, Apple, and other technology companies competing freely for customers on its network.
 * NEWS:**
 * [|Verizon wireless strikes back at Google Over Open Access.]**

North America's largest transportation agency, New York City Transit, has turned to Novell for improved security and management of its identity infrastructure and network access. With the world's largest fleet of subway cars and public buses, NYC Transit transports more than 7 million people each day. NYC Transit is using Novell(R) identity and security management solutions to centralize and automate its identity infrastructure for 49,000 staff members across 500 locations, ensuring timely and secure employee access to network resources.
 * [|New York City transit boosts network security]**

= =