Sponsored Links

Sabtu, 07 Juli 2018

Sponsored Links

Solve 'enter network password' annoyance and trusted file location ...
src: i.ytimg.com

Trusted Network Connect (TNC) is an open architecture for Network Access Control, promulgated by the Trusted Network Connect Work Group (TNC-WG) of the Trusted Computing Group (TCG).


Video Trusted Network Connect



History

The TNC architecture was first introduced at the RSA Conference in 2005. TNC was originally a network access control standard with a goal of multi-vendor endpoint policy enforcement.

In 2009 TCG announced expanded specifications which extended the specifications to systems outside of the enterprise network. Additional uses for TNC which have been reported include Industrial Control System (ICS), SCADA security, and physical security.


Maps Trusted Network Connect



Specifications

Specifications introduced by the TNC Work Group:

  • TNC Architecture for Interoperability
  • IF-IMC - Integrity Measurement Collector Interface
  • IF-IMV - Integrity Measurement Verifier Interface
  • IF-TNCCS - Trusted Network Connect Client-Server Interface
  • IF-M - Vendor-Specific IMC/IMV Messages Interface
  • IF-T - Network Authorization Transport Interface
  • IF-PEP - Policy Enforcement Point Interface
  • IF-MAP - Metadata Access Point Interface
  • CESP - Clientless Endpoint Support Profile
  • Federated TNC

Ipswitch Gateway Datasheet - Ipswitch
src: www.ipswitch.com


TNC Vendor Adoption

A partial list of vendors who have adopted TNC Standards:

Also, networking by

  • Cisco
  • HP
  • Symantec
  • Trapeze Networks
  • Tofino
Smart Card Authentication - Military-grade Remote Login | Dameware
src: play.vidyard.com


TNC Customer Adoption

The U.S. Army has planned to use this technology to enhance the security of its computer networks.

The South Carolina Department of Probation, Parole, and Pardon Services has tested a TNC-SCAP integration combination in a pilot program.


How to set up a VPN and watch US TV in the UK without getting ...
src: cdn1.expertreviews.co.uk


See also

  • IF-MAP
  • Trusted Computing
  • Trusted Computing Group
  • Trusted Internet Connection

How to manage wireless network connections on Windows 10 | Windows ...
src: www.windowscentral.com


References


Network Access- Trusted IP Range Edit - Salesforce - Developer ...
src: webkul.com


Sources

  • Dornan, Andy. "'Trusted Network Connect' Puts Hardware Security Agent In Every PC", "Information Week Magazine", UBM Techweb Publishing.
  • Vijayan, Jaikumar. "Vendor Group Adds Net Access Specs", "Computer World Magazine", IDG Publishing.
  • Higgins, Kelly Jackson. "Trusted Computing Group Widens Security Specs Beyond Enterprise Networks", "Dark Reading", UBM Techweb Publishing.
  • Townsend, Mark. "Naked endpoints on your net, and what to do about them", "SC Magazine", Haymarket Media.
  • Fang, Juan and Zeng, Hongli. "The Model of Trusted Network Connect Based on Credibility of the Hierarchy", nswctc, vol. 2, pp.454-457, 2010 Second International Conference on Networks Security, Wireless Communications and Trusted Computing, 2010.
  • Howard, Scott (2010-06)("Securing SCADA and Control Networks", "urunkoruma.com".

connected learning | User Generated Education
src: usergeneratededucation.files.wordpress.com


External links

  • Trusted Network Connect
  • Specifications
  • TNC SDK

Source of the article : Wikipedia

Comments
0 Comments