logo

Network Fundamentals: Concerns of Remote Connections

   

Added on  2022-07-29

4 Pages463 Words26 Views
 | 
 | 
 | 
NETWORK FUMDAMENTALS: CONCERNS OR REMOTE CONNECTION
Student’s Name
Instructor’s Name
Institutional Affiliations
Date
Network Fundamentals: Concerns of Remote Connections_1

Network Fundamentals: Concerns of Remote Connections
Remote connection is part of technological innovation that has been very useful. It allow
individuals to access systems they may need while they are away. Besides its overwhelming
significance, this technology is associated with a considerable concerns.
Connecting to a system from a remote location is prone to cyber risks. Because various
devices (including personal devices) can be used to connect to a remote system, there are
chances that a network can be infected by malware and outside threats1. The point is that not all
devices that connect to a system remotely are safe and secure. There are chances that some of
these devices may have some security flaws that can infect the system.
Another concern associated with the remote connection is poor policy implementation.
This mainly apply to organizations and institutions. Some organizations does not have robust
remote access policies that provide restriction to some users who access their networks from
remote locations. The lack of solid policies makes it difficult for monitoring and preventing
attackers from invading the system.
Fortunately, there are ways through which these risks can be avoided. One way is by
ensuring that access to a system is restricted to certain users2. Also, living a system open even
when it is not used may increase the chances of falling victims of security attack and malware
threats. As such, a system should be turned off when not in use. Users should also be advised to
have the devices which they use to access the system checked regularly. Above all
1D. Papp, M. Zhendona, and B. Levente. "Embedded systems security: Threats, vulnerabilities, and attack
taxonomy," p.145.
2 Rao, Goutham P., Robert A. Rodriguez, and Eric R. Brueggemann. "Method and systems for securing
remote access to private networks," p. 18.
Network Fundamentals: Concerns of Remote Connections_2

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Saving The Organizational Data
|8
|2189
|13

Security Threats in Cloud Computing
|4
|668
|210

IS Security and Risk Management Assignment PDF
|10
|3410
|84

Internet of Things Information Security
|8
|1630
|308

zw68 Network And Security Analysis
|8
|1166
|13

Networking: Malicious Attacks, Social Engineering, Information Security Risks, Network Auditing, and Risk Assessment Management
|10
|3587
|73