Prepare appropriate steps for strategy and policy construction.
IT537-2: Synthesize cybersecurity threats and their potential consequences to assess risk.
The Extensible Authentication Protocol (EAP) fits inside of the Point-to-Point Protocol footprint and is designed to give security administrators a type of framework for implementing a variety of authentication methods. By using EAP, all sorts of authentication systems can be used together to build a cohesive authentication scheme. The IEEE 802.1X standard defines how EAP is used on a LAN. For this Assignment, discuss how the 802.1X authentication standard and EAP can be used to mitigate at least three authentication security risks.
Following the process described in the “Conducting Research”, write a 5–6-page research paper that examines the role of the IEEE 802.1X standard and EAP in securely creating effective schemes of authentication in depth. Be sure to expand on how the various methods effectively work together and include a minimum of three appropriate authentication methods that would be used in a comprehensive authentication scheme, along with the related authentication security risks that they mitigate. The minimum page count is 5–6 pages (excluding cover page, etc.). If you require more pages to thoroughly defend your position, feel free to include them.
Your paper should use Times New Roman 12-point font, be double spaced, and use correct APA formatting (cover page, table of contents, abstract, and reference page). Be sure to use proper APA in-text citations that match your reference list.
A minimum of three peer-reviewed articles should be used to support your narrative in the research paper. Use the Library to search for supporting articles and use the “peer reviewed” filter to find the appropriate material. You may also use additional material, such as trade magazine articles, but avoid Wikipedia.
In accordance with the Academic Integrity policy, your Assignment will be automatically submitted to TurnItIn (see http://turnitin.com/en_us/features/originalitycheck). The policy states that papers submitted for credit in any course should contain less than 25% non-original material, so avoid large sections of direct quotes and be sure that you use APA formatting to properly cite and reference all non-original material.
No more than one figure and/or one table should be included and any figures or tables used must clearly support a specific point of the critical analysis. Any figure or table must use an APA formatted figure or table caption.
The research paper follows the Writing Guide requirements and establishes a main point or position, uses a minimum of three peer-reviewed sources in support of that position, and provides a clearly worded conclusion.
The essay is 5–6 pages of content (excluding cover sheet, etc.) and uses Times New Roman 12-point font, is double spaced, and uses correct APA formatting (cover page, table of contents, abstract, and reference page).
No more than one figure and/or table in the content.
No spelling errors.
No grammar errors.
No APA errors.