logo

Network Security: Remote Access, Interconnecting Devices, and WAN Technologies

   

Added on  2023-06-07

9 Pages1459 Words154 Views
Running head: NETWORK SECURITY
NETWORK SECURITY
Name of student:
Name of university:
Author’s note:
Network Security: Remote Access, Interconnecting Devices, and WAN Technologies_1
1NETWORK SECURITY
Remote access technologies
Redesigning of the current network at the FNU can be executed by the use of Remote
desktop protocol, virtual private network and cloud storage facility. Technologies for remote
access are of various kinds including cloud computing. The most commonly used remote
access technologies are:
1. Remote desktop protocol: RDP assists users by providing control to the client
system supervisors for accessing mutual files, printers that are connected locally or
over the network, and several other devices. RDP provides support on both server
and client for security in transport layer (TLS) 1.0. This protocol is considered to be
very secure as it has 128-bit encryption using an RC4 encryption (Ku et al. 2016).
2. Virtual private Networks: VPNs or Virtual Private Networks regularly secure the
data of a corporation using firewalls and encrypted data. VPN is used to make all the
functionality available to the local user with access to the central system of an
organisation network (Kaur 2017). The office capabilities for the FNU like sharing
of files, scanners and printers access, password-protected access to files, websites
and intranets, and logons to organisation management systems can be accomplished
remotely. The main objective of enabling remote access technologies in the system
of an organisation is to implement maximum functionality and security. A private
and secure network for the faculty and the students of FNU can be provided by this
network. The information required by any user can be accessed easily and the threat
of data theft can be minimised by the application of virtual private network.
3. Cloud storage: All the data of an organisation can be stored in a single database
known as cloud storage. Cloud provides better security to the information and data
of the organisation and it can be accessed with proper authentication from anywhere
Network Security: Remote Access, Interconnecting Devices, and WAN Technologies_2
2NETWORK SECURITY
with the internet technology. This method is most effective method of implementing
remote access in an organisation. The important records and files are updated
regularly in the cloud and in the case of data loss or theft of data, the backup of these
files can be easily restored (Yang et al. 2013). This is essential for storing all the data
of FNU in a centralised storage facility with maximum security and protection. Data
backup canbe achieved easily with the introduction of cloud storage in the network
of FNU.
Network Security: Remote Access, Interconnecting Devices, and WAN Technologies_3

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Application of VPN to JKS Accountant
|13
|1078
|392

Virtual Private Network Replacement Technologies
|5
|3994
|500

Security in Cryptography | Assignment
|7
|1502
|13

RVPN advantages and its types.
|5
|866
|22

REPORT ON VIRTUAL PRIVATE NETWORK
|12
|1820
|59

Advanced Network Security: Encryption, Cloud Storage, Digital Signatures, and Trojan Horse Attacks
|8
|1887
|117