Free

Remote Access Risks - Coursework Example

Comments (0) Cite this document
Summary
The dial-up remote access is used when a client is in use of telecommunication infrastructure in a bid to create physical connection with a remote server which is connected to any Local Area Network (LAN). This is usually a private communication portal. A virtual private network…
Download full paperFile format: .doc, available for editing
GRAB THE BEST PAPER93.4% of users find it useful
Remote Access Risks
Read TextPreview

Extract of sample "Remote Access Risks"

Remote Access Risks Affiliation: Research the different types of VPNs and other relevant remote access applications
The dial-up remote access is used when a client is in use of telecommunication infrastructure in a bid to create physical connection with a remote server which is connected to any Local Area Network (LAN). This is usually a private communication portal. A virtual private network (VPN) is a complex internet connection whose communication is linked through another network. The communication from a client is carried out virtually using the IP. Even though it is secure way of communication, it is public unlike the dial-up (Lewis, 2006).
Some of the most flexible VPNs include MPLS which is flexible and supports QoS and multicast but its security connection is expensive to set up and complicated. The SSL VPN is the most secure as it connects PC browser to the application server. The security is as a result of its encryption and firewall. There are hybrids that combine the features of SSL and IPSec which means their security is way tighter and more expensive than the rest.
The Internet protocol security is the secure socket that is used for the security of VPNs. They operate through different levels which are all flexible and have their own different advantages. The other advantage of VPN security is that their access methods can be changed by network administrator in case of any security breach. It can be used by many people including contractors, employees, business partners as well as mobile employees (Northcutt and Edmead, 2003).
Overall, the VPNs have reduced cost compared to other remote access and are more flexible. The fact that they are public means the security needs to be tighter than other remote access.
References
Lewis, M. (2006). Comparing, Designing, and Deploying VPNs. New York: Adobe Press.
Northcutt, S. and Edmead, M. (2003). Inside Network Perimeter Security: The Definitive Guide to Firewalls, VPNs, Routers, and Intrusion Detection Systems. New York: New Riders. Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Remote Access Risks Coursework Example | Topics and Well Written Essays - 250 words”, n.d.)
Remote Access Risks Coursework Example | Topics and Well Written Essays - 250 words. Retrieved from https://studentshare.org/information-technology/1679102-remote-access-risks
(Remote Access Risks Coursework Example | Topics and Well Written Essays - 250 Words)
Remote Access Risks Coursework Example | Topics and Well Written Essays - 250 Words. https://studentshare.org/information-technology/1679102-remote-access-risks.
“Remote Access Risks Coursework Example | Topics and Well Written Essays - 250 Words”, n.d. https://studentshare.org/information-technology/1679102-remote-access-risks.
  • Cited: 0 times
Comments (0)
Click to create a comment or rate a document

CHECK THESE SAMPLES OF Remote Access Risks

Remote Surgery

...? Remote Surgery Introduction Similarly with computers’ revolution, the last half of the 20th century marked massive change in the field of robotics and as we speak, they are making such great impact in advancement of technology and development especially in the 21st century. So far we have witnessed robots carry out critical tasks such as manufacturing of automobiles and other consumer services and goods by speeding and streaming up the design and assembly process. Amazing we have even robots functioning as robots pets and lawn mowers. Additionally robots have been utilized to reach destinations that man has not yet landed, such as depths of the sea and other planets and heavenly bodies (Borzellino 120). With this growing trend... , there is...
11 Pages(2750 words)Term Paper

Remote Access Computer Trojan

...the risks associated with RAT. All the VPN access must be made within secured and protected internet connections i.e. the end point security must be at functioning state. Conclusion Rapid developments in science and technology have actually enabled the cyber criminals to design computer software and viruses which can significantly harm any computer. Moreover the current computer viruses such as Remote Access Trojan are able to leak out the confidential information from government offices, secret agencies and huge corporations. RAT attack is actually executed through entering the bonded command in to the computer [Rog02]. For instance, intruders usually bind RAT with...
4 Pages(1000 words)Research Paper

Case Study 4: Remote Access Attacks

... organizational design that all employees follow in an effort to ensure the integrity of their data and entire system. References Hoogenboom, M., and Steemers, P. (2000). Security for remote access and mobile applications. Computers & Security, 19(2), 149-163. Schechter, S. E. (2005). Toward econometric models of the security risk from remote attacks. IEEE Security & Privacy Magazine, 3(1), 40-44. Weigold, T., Kramp, T., and Baentsch, M. (2008). Remote client authentication. IEEE Security & Privacy Magazine, 6(4), 36-43.... ? Remote Access Attacks Remote Access Attacks As we know, remote access attacks can debilitate any company, but is...
5 Pages(1250 words)Essay

Remote Access Attacks

...that are able self-propagate through the Internet. However, some worms also do irreparable damage to computers. Self destructive software’s are installed in the PC due to the availability of these worms which carry malicious payloads’. Remote control of infected hosts is often a primary goal of worm writers who seek to crash high-profile websites and services through “Denial of Service” attacks. Spoofing When a computer on a network pretends to have the identity of another computer, mostly the one with special access privileges, there is an IP address spoofing where the source IP address is altered to conceal the identity of the attacker and have the victim thinks it’s coming from a trusted source. The...
5 Pages(1250 words)Case Study

Network Remote Access

...Remote Access The most ideal way of connecting to the office network would to use a virtual private network (VPN) when you are away from the office. In order to connect to the office VPN server we need to first connect to a local carrier (i.e.) Internet service provider (ISP). A connection to Internet service provider can be established by the following ways. 1. Dial up connection using a telephone. 2. Dial up connection using a mobile phone having GPRS connectivity. 3. DSL connection having a subscription with the ISP. 4. Leased lines from client to the office network (broad band). 5. Wireless connection to ISP using a NIC or a data card. 6. Remote server access using a...
5 Pages(1250 words)Essay

File Systems, Remote Access, and Monitoring

...1. Security suggestions for laptop users to securely access network resources, and to secure files on their laptops Laptop users can securelyaccess network resources using Terminal Services (TS). On Windows Server 2003 operating systems, the Terminal Server feature gives users at client computers throughout your network access to Windows-based programs installed on terminal servers. With Terminal Servers installed at Windows 2003 servers in four offices in Andersen & Sons, laptop users can run programs, save files, and use network resources, all from a remote location, as if these resources were installed on their own computers. They must have installed Terminal Services clients for...
3 Pages(750 words)Essay

Remote sensing

...The Remote Sensing Workflow: The planet-Earth is full of many adventures and natural phenomena, that we are still unfamiliar with, despite our innumerable efforts to proceed in the field of science and technology. To know and comprehend the planet that we live in and study the phenomena occurring within it, both natural and otherwise, there is a dire need to obtain accurate, comprehensive and robust data about the earth. The most efficient and promising way to achieve this is with the help of monitoring the earth through remote observation. (For example space). Morris & Kokhan (2007, p. 239) have defined the remote sensing as a field of science or art that makes use of energy reflected...
6 Pages(1500 words)Essay

Define a Remote Access Policy to Support Remote Health Care Clinics

...configuration of the systems b) Management policies of user accounts c) Secure support system in remote access The trainings aspect that target non-technical users include and emphasize on: a) Identification of social engineering tactics b) How enforcement and establishment of security policies can affect the bottom line. c) Public relations effects of viruses, DoS attacks and how security policies aid minimizing the risk. d) How to minimize down time usage through increased productivity through the locked down systems Training of users and the systems administrators play a crucial role in an organization. The systems administrators and the management need to realize that security...
2 Pages(500 words)Essay

Remote Sensing

...Remote Sensing Q The bright color at A shows an area on the earth surface without vegetative cover. Feature Ais possibly a snow-capped area in the landscape. Feature A may also represent a well that has liquids such as natural gas or body of water. The feature is visible around mountain areas in a streaming shape that shows the flow in the direction towards low altitude areas. Feature A reflects light to produce a different color from the area B and C. Q 2 Assuming Landsat scale resolution of 1800 by 1200, the length of the feature at A is 3 miles. Q 3 The Bright dots besides B show areas of that do not have vegetation cover. Exposed areas appear brown in the satellite image compared to areas at B that have...
1 Pages(250 words)Assignment

Remote sensing project

...these innovations as new technology harms. This is due to the risks behind using the new technological gadgets in private and public surveillance. Rushin suggests that the federal court ought to create regulations on the use of police surveillance gadgets in order to address the public panic created by the idea of a widespread in police surveillance. This aspect contributes to the discussion behind a reassessment of the Fourth Amendment doctrine (Rushin, 2011, p. 282). Thompson, R. M. 2013, April 3. Drones in domestic surveillance operations: Fourth amendment implications and legislative responses (Rep. No. R42701). Retrieved April 3, 2014, from Congressional Research Service website:...
1 Pages(250 words)Annotated Bibliography
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.

Let us find you another Coursework on topic Remote Access Risks for FREE!

Contact Us