SlideShare a Scribd company logo
Network access
control.
Page 2
Instructor, PACE-IT Program – Edmonds Community College
Areas of expertise Industry Certifications
 PC Hardware
 Network Administration
 IT Project Management
 Network Design
 User Training
 IT Troubleshooting
Qualifications Summary
Education
 M.B.A., IT Management, Western Governor’s University
 B.S., IT Security, Western Governor’s University
Entrepreneur, executive leader, and proven manger
with 10+ years of experience turning complex issues
into efficient and effective solutions.
Strengths include developing and mentoring diverse
workforces, improving processes, analyzing
business needs and creating the solutions
required— with a focus on technology.
Page 3
PACE-IT.
– Edge vs. access control.
– Access control concepts.
Page 4
Network access control.
Page 5
When access to network
resources is granted or
denied by a firewall, it is
considered to be at the edge
of the network.
While this may work well in smaller and simpler networks, it can
become very complicated and cumbersome as the network
grows. Through implementing other access control measures,
these complications can be reduced, while at the same time, the
security of the network may be increased. This is called network
access control.
These access control measures do not replace the need for
firewalls. They do, however, allow the firewalls to concentrate on
controlling the network traffic into and out of the network—which
is what they do best—and not be concerned about who or what
type of devices can connect.
Network access control.
Page 6
Network access control.
Page 7
Network access control.
– Authentication via 802.1x.
» A popular method of authenticating client devices and
users on 802.3 (Ethernet) and 802.11 (wireless)
networks.
• When a client device—called the supplicant—attempts
to join a network, an authenticator—usually a switch or
wireless access point (WAP)—requests the client’s
credentials.
• The authenticator forwards the client’s credentials to an
authentication server—typically running software such
as RADIUS (Remote Authentication Dial In User
Service).
• The authentication server evaluates the credentials and
either informs the authenticator to allow or deny the
supplicant device access to the protected network.
• If the credentials are validated, the authenticator grants
the supplicant access to the protected network.
Page 8
Network access control.
– Posture assessment.
» The process of evaluating more than just the client’s
credentials.
• Commonly used to evaluate the type of device (e.g., a
tablet or PC).
• Commonly used to evaluate the type of anti-malware
software on the device and how updated that software
is (also a check is performed at this time to determine if
malware is present on the device).
• Commonly used to evaluate the operating system (OS)
and how updated the OS is; it will also evaluate the
registry settings of the OS at this time.
» If the client passes the assessment, it is allowed onto the
protected network.
» If the client does not pass the assessment, usually one of
two actions are taken:
• The client is notified of the rejection and what has to
occur before it can pass the posture assessment.
• The client is passed on to a remediation server, which
will attempt to resolve the cause of the failed posture
assessment, with no user interaction required.
Page 9
Network access control.
– Posture assessment process.
» One of two types of agents (software code) is used on
client devices during the assessment process.
• A persistent agent is permanently loaded on the
device and starts when the OS loads. This type of agent
can provide more functionality than the other version
(e.g., system alerts and auto remediation).
• With a non-persistent agent, when the client device
attempts to access the network, the agent is loaded
onto the device to help in the assessment process.
Once the assessment process is completed—pass or
fail—the agent is removed from the device.
• When the device attempts to connect to the protected
network, it is placed on a guest network with very
limited access—until the assessment process is
completed.
• In some cases (e.g., the client fails the antimalware
check), the client device may be placed in a quarantine
network with access to a remediation server—until the
client device can successfully pass the posture
assessment.
Page 10
Network access control.
When a firewall is used to control access to a network, it is considered edge
access control. While this works with simpler networks, it can become
complicated and cumbersome as a network grows. One solution is to
implement different network access control measures. This can be used to
increase the security of the network and let the firewall concentrate on
doing what it does best.
Topic
Edge vs. access control.
Summary
Access control can be implemented through 802.1x, in which a device—the
supplicant—requests access to a network via an authenticator. The
authenticator relies upon the services of an authentication server to receive
permission to allow the supplicant access to the network. Posture
assessment uses either persistent or non-persistent agents to help evaluate
client devices for common criteria. During the assessment process, the
client device is placed in a limited capability guest network. In some cases,
when a client device fails the posture assessment, it may be placed in a
quarantine network until a remediation server can resolve the issue causing
the failed assessment.
Access control concepts.
Page 11
THANK YOU!
This workforce solution was 100 percent funded by a $3 million grant awarded by the
U.S. Department of Labor's Employment and Training Administration. The solution was
created by the grantee and does not necessarily reflect the official position of the U.S.
Department of Labor. The Department of Labor makes no guarantees, warranties, or
assurances of any kind, express or implied, with respect to such information, including
any information on linked sites and including, but not limited to, accuracy of the
information or its completeness, timeliness, usefulness, adequacy, continued availability
or ownership. Funded by the Department of Labor, Employment and Training
Administration, Grant #TC-23745-12-60-A-53.
PACE-IT is an equal opportunity employer/program and auxiliary aids and services are
available upon request to individuals with disabilities. For those that are hearing
impaired, a video phone is available at the Services for Students with Disabilities (SSD)
office in Mountlake Terrace Hall 159. Check www.edcc.edu/ssd for office hours. Call
425.354.3113 on a video phone for more information about the PACE-IT program. For
any additional special accommodations needed, call the SSD office at 425.640.1814.
Edmonds Community College does not discriminate on the basis of race; color; religion;
national origin; sex; disability; sexual orientation; age; citizenship, marital, or veteran
status; or genetic information in its programs and activities.

More Related Content

PPTX
PACE-IT: Risk and Security Related Concepts
PPTX
PACE-IT: Physical Network Security Control
PPTX
PACE-IT: Common Threats (part 2)
PPTX
PACE-IT: Common Threats (part 1)
PPTX
PACE-IT: Common Network Vulnerabilities
PPTX
PACE-IT: Common Network Security Issues
PPTX
PACE-IT: Network Hardening Techniques (part 2)
PPTX
PACE-IT: Network Hardening Techniques (part 3)
PACE-IT: Risk and Security Related Concepts
PACE-IT: Physical Network Security Control
PACE-IT: Common Threats (part 2)
PACE-IT: Common Threats (part 1)
PACE-IT: Common Network Vulnerabilities
PACE-IT: Common Network Security Issues
PACE-IT: Network Hardening Techniques (part 2)
PACE-IT: Network Hardening Techniques (part 3)

What's hot (20)

PPTX
PACE-IT, Security+1.1: Introduction to Network Devices (part 2)
PPTX
PACE-IT, Security+1.2: Secure Network Administration Concepts
PPTX
PACE-IT: Network Hardening Techniques (part 1)
PPTX
PACE-IT: Basic Forensic Concepts
PPTX
PACE-IT, Security+3.4: Summary of Wireless Attacks
PPTX
PACE-IT, Security+ 4.3: Solutions to Establish Host Security
PPTX
PACE-IT, Security+1.3: Cloud Concepts
PPTX
PACE-IT, Security+3.5: Types of Application Attacks (part 1)
PPTX
PACE-IT, Security+3.6: Security Enhancement Techniques
PPTX
PACE-IT, Security+3.2: Summary of Types of Attacks (part 1)
PPTX
PACE-IT: Firewall Basics
PPTX
PACE-IT, Security+3.7: Overview of Security Assessment Tools
PPTX
PACE-IT, Security+2.7: Physical Security and Enviornmental Controls
PPTX
PACE-IT: Common WAN Components and Issues
PPTX
PACE-IT, Security+2.6: Security Related Awareness and Training
PPTX
PACE-IT, Security+2.8: Risk Management Best Practices
PPTX
PACE-IT: The Importance of Network Segmentation
PPTX
PACE-IT, Security+ 4.1: Application Security Controls and Techniques
PPTX
Pace it troubleshooting-common_network_issues_bf
PPTX
PACE-IT, Security+ 2.4: Basic Forensic Procedures
PACE-IT, Security+1.1: Introduction to Network Devices (part 2)
PACE-IT, Security+1.2: Secure Network Administration Concepts
PACE-IT: Network Hardening Techniques (part 1)
PACE-IT: Basic Forensic Concepts
PACE-IT, Security+3.4: Summary of Wireless Attacks
PACE-IT, Security+ 4.3: Solutions to Establish Host Security
PACE-IT, Security+1.3: Cloud Concepts
PACE-IT, Security+3.5: Types of Application Attacks (part 1)
PACE-IT, Security+3.6: Security Enhancement Techniques
PACE-IT, Security+3.2: Summary of Types of Attacks (part 1)
PACE-IT: Firewall Basics
PACE-IT, Security+3.7: Overview of Security Assessment Tools
PACE-IT, Security+2.7: Physical Security and Enviornmental Controls
PACE-IT: Common WAN Components and Issues
PACE-IT, Security+2.6: Security Related Awareness and Training
PACE-IT, Security+2.8: Risk Management Best Practices
PACE-IT: The Importance of Network Segmentation
PACE-IT, Security+ 4.1: Application Security Controls and Techniques
Pace it troubleshooting-common_network_issues_bf
PACE-IT, Security+ 2.4: Basic Forensic Procedures
Ad

Viewers also liked (20)

ODP
ASFWS 2011 : CAS, OpenID, SAML concepts, différences et exemples
PDF
CAS, OpenID, SAML : concepts, différences et exemples
PDF
2014 NAC candidate orientation presentation
PDF
Clusif 2014 scada panorama des referentiels sécurité système information ind...
DOCX
Network Access Control as a Network Security Solution
PDF
Physical/Network Access Control
PDF
Clusif 2014 Annexes référentiels de sécurité système information industriel /...
ODP
BPM & Workflow
PDF
CAS, OpenID, Shibboleth, SAML : concepts, différences et exemples
PDF
Génération d'applications web avec Bonita
 
PDF
Introduction à BPMN 2.0 - Business Process Modeling Notation
PPTX
Le BPM facile avec Bonita Open Solution
PDF
LES SYSTEMES DE GESTION DES IDENTITES ET DES ACCES : MISE EN ŒUVRE ET APPORT ...
PDF
Le processus de gestion des habilitations
PDF
Atelier9 gestion des_identites_et_sso
PDF
Architecture of a Modern Web App
PPTX
DevOps Day - Infrastructure As A Code
PDF
Sécurisation des entrepôts de données : Etat de l’art et proposition
PDF
MIRADOC 2010 - MIRACL Lab. : Etat d'avancement des travaux de thèse
PPTX
Durcissement de code - Sécurité Applicative Web
ASFWS 2011 : CAS, OpenID, SAML concepts, différences et exemples
CAS, OpenID, SAML : concepts, différences et exemples
2014 NAC candidate orientation presentation
Clusif 2014 scada panorama des referentiels sécurité système information ind...
Network Access Control as a Network Security Solution
Physical/Network Access Control
Clusif 2014 Annexes référentiels de sécurité système information industriel /...
BPM & Workflow
CAS, OpenID, Shibboleth, SAML : concepts, différences et exemples
Génération d'applications web avec Bonita
 
Introduction à BPMN 2.0 - Business Process Modeling Notation
Le BPM facile avec Bonita Open Solution
LES SYSTEMES DE GESTION DES IDENTITES ET DES ACCES : MISE EN ŒUVRE ET APPORT ...
Le processus de gestion des habilitations
Atelier9 gestion des_identites_et_sso
Architecture of a Modern Web App
DevOps Day - Infrastructure As A Code
Sécurisation des entrepôts de données : Etat de l’art et proposition
MIRADOC 2010 - MIRACL Lab. : Etat d'avancement des travaux de thèse
Durcissement de code - Sécurité Applicative Web
Ad

Similar to PACE-IT: Network Access Control (20)

PPTX
PACE-IT, Security+3.8: Vulnerability Scanning vs Pen Testing
PPTX
PACE-IT: Introduction_to Network Devices (part 2) - N10 006
PDF
Thick Client Penetration Testing Modern Approaches and Techniques.pdf
PPTX
Pace IT - Maintenance Procedures Best Practices
PPTX
PACE-IT, Security+1.3: Secure Network Design Elements and Components
PPTX
PACE-IT: Supporting Configuration Management (part 2)
DOCX
Access Control, Authentication, and Public Key Infrastructure .docx
PPTX
PACE-IT, Security+ 2.2: Integrating Data and Systems with 3rd Parties
PPTX
Pace IT - Troubleshooting Security
DOCX
Backtrack manual Part1
PPTX
Pace IT - Admin Tools (Part 1)
PPT
M Kamens Iia Financial Services Presentation At Disney
PPTX
PACE-IT, Security+ 2.1: Risk Related Concepts (part 3)
PDF
Sample Risk Assessment Report- QuantumBanking.pdf
PDF
Dumpscafe CompTIA Security+ SY0-701 Exam Dumps
PPTX
PACE-IT, Security + 5.2: Authentication and Authorization Basics (part 2)
PDF
Getting the Most Value from VM and Compliance Programs white paper
PPTX
PACE-IT, Security+2.9: Goals of Security Controls
PPT
NH Bankers 10 08 07 Kamens
PPTX
ISS CAPSTONE TEAM
PACE-IT, Security+3.8: Vulnerability Scanning vs Pen Testing
PACE-IT: Introduction_to Network Devices (part 2) - N10 006
Thick Client Penetration Testing Modern Approaches and Techniques.pdf
Pace IT - Maintenance Procedures Best Practices
PACE-IT, Security+1.3: Secure Network Design Elements and Components
PACE-IT: Supporting Configuration Management (part 2)
Access Control, Authentication, and Public Key Infrastructure .docx
PACE-IT, Security+ 2.2: Integrating Data and Systems with 3rd Parties
Pace IT - Troubleshooting Security
Backtrack manual Part1
Pace IT - Admin Tools (Part 1)
M Kamens Iia Financial Services Presentation At Disney
PACE-IT, Security+ 2.1: Risk Related Concepts (part 3)
Sample Risk Assessment Report- QuantumBanking.pdf
Dumpscafe CompTIA Security+ SY0-701 Exam Dumps
PACE-IT, Security + 5.2: Authentication and Authorization Basics (part 2)
Getting the Most Value from VM and Compliance Programs white paper
PACE-IT, Security+2.9: Goals of Security Controls
NH Bankers 10 08 07 Kamens
ISS CAPSTONE TEAM

More from Pace IT at Edmonds Community College (18)

PPTX
PACE-IT, Security+ 6.3: Introduction to Public Key Infrastructure (part 2)
PPTX
PACE-IT, Security+ 6.3: Introduction to Public Key Infrastructure (part 1)
PPTX
PACE-IT, Security+ 6.2: Cryptographic Methods (part 2)
PPTX
PACE-IT, Security+ 6.2: Cryptographic Methods (part 1)
PPTX
PACE-IT, Security+ 6.1: Introduction to Cryptography (part 1)
PPTX
PACE-IT, Security+ 6.1: Introduction to Cryptography (part 2)
PPTX
PACE-IT, Security + 5.3: Security Controls for Account Management
PPTX
PACE-IT, Security + 5.2: Authentication and Authorization Basics (part 1)
PPTX
PACE-IT, Security + 5.1: Summary of Authentication Services
PPTX
PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 1)
PPTX
PACE-IT, Security+ 4.5: Mitigating Risks in Alternative Environments
PPTX
PACE-IT, Security+ 4.4: Controls to Ensure Data Security
PPTX
PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 2)
PPTX
PACE-IT, Security+3.5: Types of Application Attacks (part 2)
PPTX
PACE-IT, Security+3.3: Summary of Social Engineering Attacks
PPTX
PACE-IT, Security+3.2: Summary of Types of Attacks (part 2)
PPTX
PACE-IT, Security+3.1: Types of Malware
PPTX
PACE-IT, Security+2.8: Disaster Recovery Concepts
PACE-IT, Security+ 6.3: Introduction to Public Key Infrastructure (part 2)
PACE-IT, Security+ 6.3: Introduction to Public Key Infrastructure (part 1)
PACE-IT, Security+ 6.2: Cryptographic Methods (part 2)
PACE-IT, Security+ 6.2: Cryptographic Methods (part 1)
PACE-IT, Security+ 6.1: Introduction to Cryptography (part 1)
PACE-IT, Security+ 6.1: Introduction to Cryptography (part 2)
PACE-IT, Security + 5.3: Security Controls for Account Management
PACE-IT, Security + 5.2: Authentication and Authorization Basics (part 1)
PACE-IT, Security + 5.1: Summary of Authentication Services
PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 1)
PACE-IT, Security+ 4.5: Mitigating Risks in Alternative Environments
PACE-IT, Security+ 4.4: Controls to Ensure Data Security
PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 2)
PACE-IT, Security+3.5: Types of Application Attacks (part 2)
PACE-IT, Security+3.3: Summary of Social Engineering Attacks
PACE-IT, Security+3.2: Summary of Types of Attacks (part 2)
PACE-IT, Security+3.1: Types of Malware
PACE-IT, Security+2.8: Disaster Recovery Concepts

Recently uploaded (20)

PDF
Anesthesia in Laparoscopic Surgery in India
PDF
01-Introduction-to-Information-Management.pdf
PDF
STATICS OF THE RIGID BODIES Hibbelers.pdf
PDF
Insiders guide to clinical Medicine.pdf
PDF
Saundersa Comprehensive Review for the NCLEX-RN Examination.pdf
PDF
grade 11-chemistry_fetena_net_5883.pdf teacher guide for all student
PPTX
Microbial diseases, their pathogenesis and prophylaxis
PDF
O7-L3 Supply Chain Operations - ICLT Program
PDF
Supply Chain Operations Speaking Notes -ICLT Program
PDF
Physiotherapy_for_Respiratory_and_Cardiac_Problems WEBBER.pdf
PPTX
Renaissance Architecture: A Journey from Faith to Humanism
PPTX
human mycosis Human fungal infections are called human mycosis..pptx
PPTX
Pharmacology of Heart Failure /Pharmacotherapy of CHF
PPTX
BOWEL ELIMINATION FACTORS AFFECTING AND TYPES
PDF
Pre independence Education in Inndia.pdf
PDF
The Lost Whites of Pakistan by Jahanzaib Mughal.pdf
PDF
Abdominal Access Techniques with Prof. Dr. R K Mishra
PPTX
PPT- ENG7_QUARTER1_LESSON1_WEEK1. IMAGERY -DESCRIPTIONS pptx.pptx
PDF
102 student loan defaulters named and shamed – Is someone you know on the list?
PPTX
Week 4 Term 3 Study Techniques revisited.pptx
Anesthesia in Laparoscopic Surgery in India
01-Introduction-to-Information-Management.pdf
STATICS OF THE RIGID BODIES Hibbelers.pdf
Insiders guide to clinical Medicine.pdf
Saundersa Comprehensive Review for the NCLEX-RN Examination.pdf
grade 11-chemistry_fetena_net_5883.pdf teacher guide for all student
Microbial diseases, their pathogenesis and prophylaxis
O7-L3 Supply Chain Operations - ICLT Program
Supply Chain Operations Speaking Notes -ICLT Program
Physiotherapy_for_Respiratory_and_Cardiac_Problems WEBBER.pdf
Renaissance Architecture: A Journey from Faith to Humanism
human mycosis Human fungal infections are called human mycosis..pptx
Pharmacology of Heart Failure /Pharmacotherapy of CHF
BOWEL ELIMINATION FACTORS AFFECTING AND TYPES
Pre independence Education in Inndia.pdf
The Lost Whites of Pakistan by Jahanzaib Mughal.pdf
Abdominal Access Techniques with Prof. Dr. R K Mishra
PPT- ENG7_QUARTER1_LESSON1_WEEK1. IMAGERY -DESCRIPTIONS pptx.pptx
102 student loan defaulters named and shamed – Is someone you know on the list?
Week 4 Term 3 Study Techniques revisited.pptx

PACE-IT: Network Access Control

  • 2. Page 2 Instructor, PACE-IT Program – Edmonds Community College Areas of expertise Industry Certifications  PC Hardware  Network Administration  IT Project Management  Network Design  User Training  IT Troubleshooting Qualifications Summary Education  M.B.A., IT Management, Western Governor’s University  B.S., IT Security, Western Governor’s University Entrepreneur, executive leader, and proven manger with 10+ years of experience turning complex issues into efficient and effective solutions. Strengths include developing and mentoring diverse workforces, improving processes, analyzing business needs and creating the solutions required— with a focus on technology.
  • 3. Page 3 PACE-IT. – Edge vs. access control. – Access control concepts.
  • 5. Page 5 When access to network resources is granted or denied by a firewall, it is considered to be at the edge of the network. While this may work well in smaller and simpler networks, it can become very complicated and cumbersome as the network grows. Through implementing other access control measures, these complications can be reduced, while at the same time, the security of the network may be increased. This is called network access control. These access control measures do not replace the need for firewalls. They do, however, allow the firewalls to concentrate on controlling the network traffic into and out of the network—which is what they do best—and not be concerned about who or what type of devices can connect. Network access control.
  • 7. Page 7 Network access control. – Authentication via 802.1x. » A popular method of authenticating client devices and users on 802.3 (Ethernet) and 802.11 (wireless) networks. • When a client device—called the supplicant—attempts to join a network, an authenticator—usually a switch or wireless access point (WAP)—requests the client’s credentials. • The authenticator forwards the client’s credentials to an authentication server—typically running software such as RADIUS (Remote Authentication Dial In User Service). • The authentication server evaluates the credentials and either informs the authenticator to allow or deny the supplicant device access to the protected network. • If the credentials are validated, the authenticator grants the supplicant access to the protected network.
  • 8. Page 8 Network access control. – Posture assessment. » The process of evaluating more than just the client’s credentials. • Commonly used to evaluate the type of device (e.g., a tablet or PC). • Commonly used to evaluate the type of anti-malware software on the device and how updated that software is (also a check is performed at this time to determine if malware is present on the device). • Commonly used to evaluate the operating system (OS) and how updated the OS is; it will also evaluate the registry settings of the OS at this time. » If the client passes the assessment, it is allowed onto the protected network. » If the client does not pass the assessment, usually one of two actions are taken: • The client is notified of the rejection and what has to occur before it can pass the posture assessment. • The client is passed on to a remediation server, which will attempt to resolve the cause of the failed posture assessment, with no user interaction required.
  • 9. Page 9 Network access control. – Posture assessment process. » One of two types of agents (software code) is used on client devices during the assessment process. • A persistent agent is permanently loaded on the device and starts when the OS loads. This type of agent can provide more functionality than the other version (e.g., system alerts and auto remediation). • With a non-persistent agent, when the client device attempts to access the network, the agent is loaded onto the device to help in the assessment process. Once the assessment process is completed—pass or fail—the agent is removed from the device. • When the device attempts to connect to the protected network, it is placed on a guest network with very limited access—until the assessment process is completed. • In some cases (e.g., the client fails the antimalware check), the client device may be placed in a quarantine network with access to a remediation server—until the client device can successfully pass the posture assessment.
  • 10. Page 10 Network access control. When a firewall is used to control access to a network, it is considered edge access control. While this works with simpler networks, it can become complicated and cumbersome as a network grows. One solution is to implement different network access control measures. This can be used to increase the security of the network and let the firewall concentrate on doing what it does best. Topic Edge vs. access control. Summary Access control can be implemented through 802.1x, in which a device—the supplicant—requests access to a network via an authenticator. The authenticator relies upon the services of an authentication server to receive permission to allow the supplicant access to the network. Posture assessment uses either persistent or non-persistent agents to help evaluate client devices for common criteria. During the assessment process, the client device is placed in a limited capability guest network. In some cases, when a client device fails the posture assessment, it may be placed in a quarantine network until a remediation server can resolve the issue causing the failed assessment. Access control concepts.
  • 12. This workforce solution was 100 percent funded by a $3 million grant awarded by the U.S. Department of Labor's Employment and Training Administration. The solution was created by the grantee and does not necessarily reflect the official position of the U.S. Department of Labor. The Department of Labor makes no guarantees, warranties, or assurances of any kind, express or implied, with respect to such information, including any information on linked sites and including, but not limited to, accuracy of the information or its completeness, timeliness, usefulness, adequacy, continued availability or ownership. Funded by the Department of Labor, Employment and Training Administration, Grant #TC-23745-12-60-A-53. PACE-IT is an equal opportunity employer/program and auxiliary aids and services are available upon request to individuals with disabilities. For those that are hearing impaired, a video phone is available at the Services for Students with Disabilities (SSD) office in Mountlake Terrace Hall 159. Check www.edcc.edu/ssd for office hours. Call 425.354.3113 on a video phone for more information about the PACE-IT program. For any additional special accommodations needed, call the SSD office at 425.640.1814. Edmonds Community College does not discriminate on the basis of race; color; religion; national origin; sex; disability; sexual orientation; age; citizenship, marital, or veteran status; or genetic information in its programs and activities.