Question

Research and report on a commercial or open-source (hardware or software) Remote Access or VPN solution...

Research and report on a commercial or open-source (hardware or software) Remote Access or VPN solution that is based on a device or software that would address the needs of the Remote Access domain. Report on the control capabilities, features, etc that you deem pertinent in terms of securing the Remote Access domain.
0 0
Add a comment Improve this question Transcribed image text
Answer #1

What is Remote Access?

Remote access is simply the ability to access a computer or network, at home or in an office, from a remote location.

You can use a local area network (LAN), a wide area network (WAN), or a virtual private network (VPN) to establish a remote access connection.

Remote access services are any combination of software and hardware that facilitates remote access connections – and there’s plenty of software offering these services to businesses.

Unfortunately, they’re far from safe.

Remote Access Risks

The overriding risk of remote access services and software is a hacker gaining deeper access to your organization, exposing you to a host of IT security threats.

Once they gain privileged access to your system, it will be difficult to prevent data loss, prevent phishing, protect against ransomware, etc.

To help you understand how cyber attackers can infiltrate your system, here are 4 remote access risks you should guard against.

Remote Access Through Home Computers

Some companies provide their employees with work-specific computers that are closely managed and tightly locked down. This is a great practice for enhanced security.

But many companies don’t offer this service, or can’t afford the cost of corporate computers for every employee – especially SMB’s.

This leads to employees using their own personal computers for work.

If your employees access your network remotely from their laptop, they will increase the risks of your system being hacked in the following ways:

  • Home computers are often accessed by multiple people who visit various websites and execute many different pieces of software, any of which can infect your computer with malware – making it easy for a hacker to attack your business the next time you remotely access your office network.
  • Home computers usually use weak passwords or no passwords at all, making it easy to gain access to your machine, which can then be used to access your office data if you remotely connect to your business’s network.
  • Most consumer-ready antivirus products won’t stop sophisticated hackers targeting your organization – which is what most home computers are running.

Easy Logins and Passwords

Many remote access endpoints only require a simple ID and password to log on to your network.

Since most people use hackable passwords, this single sign-on method is highly problematic.

Lack of Computer Inspection

Many remote access software solutions don’t scan the remote computer for viruses or malware.

If your home or work PC has been infected, and you’re using it to access your office network remotely, then a hacker could easily install malware onto your business’s servers and spread to every machine in your office.

End Point of a VPN

Connecting to an unsecured Wi-Fi network, visiting malicious sites, and downloading hazardous software are practices that many end point users engage in – making a man-in-the-middle attack and other hacking methods for infecting your computer very easy.

Even if your VPN is secure, the infected machine can grant the hacker access to your private network.

Solutions to Remote Access Risks

So how do you prevent and solve these remote access risks?

By implementing the following solutions.

1)Set up a Firewall and Antivirus

Choosing a firewall that matches the size, scope, and scale of your organization is an essential first step in mitigating remote access risks.

Make sure your firewall has built-in antivirus and anti-malware software and high availability programs.

2)Set up an IDS and an IPS

Reliable IT security services usually offer intrusion detection systems (IDS) and Intrusion Prevention Systems (IPS).

These programs will monitor your network in the background and will watch for any suspicious or malicious activity – alerting you if it finds any.

3)Set up a VPN

A VPN is a critical tool to use to securely access sensitive data remotely.

There are many kinds of VPNs you should know about and consider using for your company.

If you use a business-grade firewall, it will usually have a built-in VPN. Also, many IT companies who offer network management services provide top-of-the-line VPN’s.

However, a VPN can be overcome if the end user engages in risky behavior like using insecure passwords.

4)Use Multi-Factor Authentication

Multi-factor authentication is one of the best solutions to the standard single sign-on method.

It requires that your users present multiple pieces of evidence to verify their identity.

An example of this would be answering a question like “where did you go to school?” and then entering your ID and password to gain access to the remote access software.

Just adding a simple question like this can greatly enhance your security.

You could take it a step further and require your outside vendors to call your operations department in order to acquire a single use passcode to remotely access your data, in addition to using their private ID and password.

If you want to get futuristic, you could use iris scanning technology or fingerprint technology for highly secure authentication.

5)Limit Information Access

Only the information required to perform their jobs should be accessible to each employee – never provide your employees with access to all of your data systems.

On top of that, be aware of employees downloading or installing any information or software without your permission – also known as shadow IT risks.

I have tried my best to REsearch on your question

Hence I have provided you the answer based on my research

If you have any doubt then please ask me in comment section

I will try my best to answer your query

ThankYou!

Happy Learning:)

Add a comment
Know the answer?
Add Answer to:
Research and report on a commercial or open-source (hardware or software) Remote Access or VPN solution...
Your Answer:

Post as a guest

Your Name:

What's your source?

Earn Coins

Coins can be redeemed for fabulous gifts.

Not the answer you're looking for? Ask your own homework help question. Our experts will answer your question WITHIN MINUTES for Free.
Similar Homework Help Questions
  • Figure 1 LAN Subnet: 192.168.40.0124 LAN Switch Internet External Firewall Internal Firewall DMZ Subnet: 192.168.10.0/24 LAN devices Web Server running on port 80 IDS (Snort VM) Remote Access S...

    Figure 1 LAN Subnet: 192.168.40.0124 LAN Switch Internet External Firewall Internal Firewall DMZ Subnet: 192.168.10.0/24 LAN devices Web Server running on port 80 IDS (Snort VM) Remote Access Server (Nginx VM) (OpenVPN) Overview Medium to large organisations typically consist of services that are accessed/consumed from external parties for various purposes. As such, a DMZ is a suitable solution to segregate such services from internal networkis). The network diagram provided (Figure 1) illustrates the IT environment of a medium organisation, which...

  • ***I only need the High Level Project Plan (Time to Implement)****** You have recently been hired...

    ***I only need the High Level Project Plan (Time to Implement)****** You have recently been hired by a new Japanese accounting firm, headquarter in Tokyo, as the director ofInformation Systems and Telecommunications. Your assignment is to assist security posture of the firm anddevelop a security structure for this new company. Write your recommendations and reasons to the firm’s CEO. The firm has 600 employees in Tokyo, 50 in Houston, and is planning to open two branch offices in India andCalifornia....

  • IT's About Business 4.1 The Heartbleed Bug What Is Heartbleed? OpenSSL, an open-source software package, is...

    IT's About Business 4.1 The Heartbleed Bug What Is Heartbleed? OpenSSL, an open-source software package, is a popular type of transport layer security (TLS) software (discussed later in this chapter) that secures numerous websites around the world. Web servers use OpenSSL to encrypt sites. Such sites show up in browsers with a “lock” icon and the “https” prefix in the address bar. The encryption protects Internet sites offering banking, shopping, email, and other private communications. Roughly two out of three...

  • computer networks help please !!! could someone help with the following tasks! ANY HELP WILL BE...

    computer networks help please !!! could someone help with the following tasks! ANY HELP WILL BE IMMENSELY APPRECIATED! THANKS. Task 1 In the following scenario, we would like to find out more information about a host that is on out network. Given an IP address we would like to search for additional information, we can start with obtaining the IP address off the default route. When running on a Linux VM, this like most likely to be the internal IP...

  • CASE 8 Unlocking the Secrets of the Apple iPhone in the Name of access the male...

    CASE 8 Unlocking the Secrets of the Apple iPhone in the Name of access the male San Bernardino suspect's iPhone 5c. Cook stated: Antiterrorism We are challenging the FBI's demands with the deepes respect for American democracy and a love of our country. We believe it would be in the best interest of everyone to step back and consider the implications While we believe the FBI's intentions are good, if would be wrong for the w e nt to force...

  • Read this article. Then write a 250 word response on two of the programs you like...

    Read this article. Then write a 250 word response on two of the programs you like the most. Open source business intelligence software 1. BIRT BIRT is an open source BI program that CloudTweaks says is often viewed as the industry standard. BIRT boasts “over 12 million downloads and over 2.5 million developers across 157 countries.” Its users include heavyweights such as Cisco, S1, and IBM (which is also a BIRT sponsor). They also have maturity going for them, as...

  • Explain what enterprise resource planning (ERP) systems. Outline several of their key characteristics. Describe in reasonable...

    Explain what enterprise resource planning (ERP) systems. Outline several of their key characteristics. Describe in reasonable detail how a company leverages an ERP system and how its operations are improved after installing an ERP system like SAP. Explain how a supply chain management system helps an organization make its operations more efficient What is Upstream and Downstream management of the supply chain? Explain the concept of “Supply Network”, its benefits, and how technology made this concept available Explain the difference...

  • Case Study 3: Driving Ari Fleet Management with Real-Time Analytics Automotive Resources International®, better known as...

    Case Study 3: Driving Ari Fleet Management with Real-Time Analytics Automotive Resources International®, better known as simply ARI®, is the world's largest privately-held company for vehicle fleet management services. ARI is headquartered in Mt. Laurel, New Jersey and has 2,500 employees and offices throughout North America, Europe, the UK, and Hong Kong. The company manages more than 1,000,000 vehicles in the U.S., Canada, Mexico, Puerto Rico and Europe. Businesses that need vehicles for shipments (trucks, vans, cars, ships, and rail...

  • First, read the article on "The Delphi Method for Graduate Research." ------ Article is posted below...

    First, read the article on "The Delphi Method for Graduate Research." ------ Article is posted below Include each of the following in your answer (if applicable – explain in a paragraph) Research problem: what do you want to solve using Delphi? Sample: who will participate and why? (answer in 5 -10 sentences) Round one questionnaire: include 5 hypothetical questions you would like to ask Discuss: what are possible outcomes of the findings from your study? Hint: this is the conclusion....

  • 1) analyze the following case 2) give a summary and suggest ways for the company ——————...

    1) analyze the following case 2) give a summary and suggest ways for the company —————— Salesforce.com, one of the most disruptive technology companies of the past few years, has single-handedly shaken up the software industry with its innovative business model and resounding success. Salesforce provides customer relationship management (CRM) and other application software solutions in the form of software as a service leased over the Internet, as opposed to software bought and installed on machines locally. The company was...

ADVERTISEMENT
Free Homework Help App
Download From Google Play
Scan Your Homework
to Get Instant Free Answers
Need Online Homework Help?
Ask a Question
Get Answers For Free
Most questions answered within 3 hours.
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT