StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Remote Access Risks - Coursework Example

Cite this document
Summary
The dial-up remote access is used when a client is in use of telecommunication infrastructure in a bid to create physical connection with a remote server which is connected to any Local Area Network (LAN). This is usually a private communication portal. A virtual private network…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER94.9% of users find it useful
Remote Access Risks
Read Text Preview

Extract of sample "Remote Access Risks"

Remote Access Risks Affiliation: Research the different types of VPNs and other relevant remote access applications The dial-up remote access is used when a client is in use of telecommunication infrastructure in a bid to create physical connection with a remote server which is connected to any Local Area Network (LAN). This is usually a private communication portal. A virtual private network (VPN) is a complex internet connection whose communication is linked through another network. The communication from a client is carried out virtually using the IP.

Even though it is secure way of communication, it is public unlike the dial-up (Lewis, 2006). Some of the most flexible VPNs include MPLS which is flexible and supports QoS and multicast but its security connection is expensive to set up and complicated. The SSL VPN is the most secure as it connects PC browser to the application server. The security is as a result of its encryption and firewall. There are hybrids that combine the features of SSL and IPSec which means their security is way tighter and more expensive than the rest.

The Internet protocol security is the secure socket that is used for the security of VPNs. They operate through different levels which are all flexible and have their own different advantages. The other advantage of VPN security is that their access methods can be changed by network administrator in case of any security breach. It can be used by many people including contractors, employees, business partners as well as mobile employees (Northcutt and Edmead, 2003). Overall, the VPNs have reduced cost compared to other remote access and are more flexible.

The fact that they are public means the security needs to be tighter than other remote access. ReferencesLewis, M. (2006). Comparing, Designing, and Deploying VPNs. New York: Adobe Press. Northcutt, S. and Edmead, M. (2003). Inside Network Perimeter Security: The Definitive Guide to Firewalls, VPNs, Routers, and Intrusion Detection Systems. New York: New Riders.

Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Remote Access Risks Coursework Example | Topics and Well Written Essays - 250 words”, n.d.)
Remote Access Risks Coursework Example | Topics and Well Written Essays - 250 words. Retrieved from https://studentshare.org/information-technology/1679102-remote-access-risks
(Remote Access Risks Coursework Example | Topics and Well Written Essays - 250 Words)
Remote Access Risks Coursework Example | Topics and Well Written Essays - 250 Words. https://studentshare.org/information-technology/1679102-remote-access-risks.
“Remote Access Risks Coursework Example | Topics and Well Written Essays - 250 Words”, n.d. https://studentshare.org/information-technology/1679102-remote-access-risks.
  • Cited: 0 times

CHECK THESE SAMPLES OF Remote Access Risks

Managing the Digital Enterprise

The Opportunities, Challenges, and risks for the Companies Operating In the Banking Industry 8 2.... risks 9 3.... Secondly and lastly, information technology modifies the ways through which the consumers access the bank's products and services, for instance, through automated channels such as remote banking.... Additionally, through the internet, the consumers are able to access numerous information and services (Heng, Hsia, and Wu 2006, p115)....
8 Pages (2000 words) Essay

Management Problems: Digital Strategies for Market Dominance

However, the review of this practice's disadvantages would help to understand that the risks of internal emails can be significant, a fact justifying the decision of Cauldwell to ban their use in Phones for U; in other firms also, it seems that the cessation of internal emails would be the only solution for avoiding severe business failures.... Dispute their necessity, internal emails have been often blamed for resulting in a series of important problems, especially at the level that competitors can access them....
8 Pages (2000 words) Case Study

Remote Access Computer Trojan

This research "remote access Computer Trojan" analyzes how rapid developments in science and technology have actually enabled the cybercriminals to design computer software and viruses which can significantly harm any computer.... hellip; remote access Computer Trojan (RAT) enables the hackers and cybercriminals to do almost anything on the victim's computer.... Let's consider an example of China where 72 organizations including government offices, corporations and non-profit companies were infected by remote access Trojan....
4 Pages (1000 words) Research Paper

Remote Access Attacks

remote access Attacks University Name remote access Attacks As we know, remote access attacks can debilitate any company, but is particularly serious for the small to medium enterprise.... hellip; Some of the assumptions that need to be made in this case include: terminated employees retaining remote access to the system via passwords that are not deleted, passwords not being changed on a regular basis, firewalls being non-existent being connected computers to the network, and no noticeable security protecting the various storage devices portrayed on the diagram....
5 Pages (1250 words) Essay

Managing Disk and Object Security and Users and Groups

Remote Desktop for Administration provides remote access to the graphical interface–based tools available in the Windows environment....                                                                                                       Features of Windows Server 2003 and Windows XP for remote support Windows Server 2003 provides the tools necessary for administrators to perform a vast array of management functions on remotely located servers....
5 Pages (1250 words) Essay

Future Prospects of British Banking

banks, they provide free banking including access to free debit card, free access to ATM'S, free use of cheques, internet banking etc.... The origin of the modern banking in Britain can be traced back across four centuries, but the last century has seen more changes in financial services arena than the preceding three centuries combined....
13 Pages (3250 words) Essay

Identifying Potential Risk, Response, and Recovery

The risks can be mitigated through creation and communication of policy against creation of tunnels or remote access within the organization.... There should be an emphasis of encryption or tunnelling technologies outside the official remote access programs and the VPN toolsets.... The review process must be created so as to approve the SSH access to the key devices o internet....
5 Pages (1250 words) Assignment

Social Media Offer of an Open Dialogue Between Brands and Consumers

The author of this paper "Social Media Offer of an Open Dialogue Between Brands and Consumers" outlines that with the growth of technology, the social media has gained in importance.... The social media has been a prominent part of the society today where the users can interact their views freely....
21 Pages (5250 words) Research Paper
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us