4.5. Summary

Following are key points from this chapter:

  • Unintentional threats are caused when a user's computer system connects and inadvertently affects the LAN.

  • Intentional threats are caused when a user knowingly and consciously tries to exploit the LAN.

  • It is extremely important to understand the actual threats that NAC can address and your company's vulnerabilities before selecting a NAC/NAP solution.

  • The actual exploits shown in this chapter can be used as ammunition to help justify a NAC/NAP solution.

  • The biggest threat to the LAN really isn't the outsider's laptop that happens to connect and infect the LAN. That can and does happen, but a user consciously exploiting the LAN is a graver threat.

  • LAN-based NAC alone will not provide adequate protection; Mobile NAC is also required.

Just as I hope this chapter was eye-opening, Chapter 5 should stop you from sleeping at night (unless you already have a Mobile NAC solution in place).

Get Implementing NAP and NAC Security Technologies: The Complete Guide to Network Access Control now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.