Remote Access Security: Network Fundamentals Report and Analysis

Verified

Added on  2022/07/29

|4
|463
|26
Report
AI Summary
This report delves into the security concerns surrounding remote connections and network fundamentals. It highlights the risks associated with remote access, including potential malware infections and the vulnerabilities introduced by various devices connecting to a system. The report emphasizes the importance of robust security policies, the potential dangers of leaving systems open, and the need for regular device checks. It also discusses the significance of restricting user access to mitigate threats. The report concludes by emphasizing the need for robust security policies and the overall importance of managing remote connections effectively to prevent security breaches. References are provided to support the arguments made in the report.
Document Page
NETWORK FUMDAMENTALS: CONCERNS OR REMOTE CONNECTION
Student’s Name
Instructor’s Name
Institutional Affiliations
Date
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
Network Fundamentals: Concerns of Remote Connections
Remote connection is part of technological innovation that has been very useful. It allow
individuals to access systems they may need while they are away. Besides its overwhelming
significance, this technology is associated with a considerable concerns.
Connecting to a system from a remote location is prone to cyber risks. Because various
devices (including personal devices) can be used to connect to a remote system, there are
chances that a network can be infected by malware and outside threats1. The point is that not all
devices that connect to a system remotely are safe and secure. There are chances that some of
these devices may have some security flaws that can infect the system.
Another concern associated with the remote connection is poor policy implementation.
This mainly apply to organizations and institutions. Some organizations does not have robust
remote access policies that provide restriction to some users who access their networks from
remote locations. The lack of solid policies makes it difficult for monitoring and preventing
attackers from invading the system.
Fortunately, there are ways through which these risks can be avoided. One way is by
ensuring that access to a system is restricted to certain users2. Also, living a system open even
when it is not used may increase the chances of falling victims of security attack and malware
threats. As such, a system should be turned off when not in use. Users should also be advised to
have the devices which they use to access the system checked regularly. Above all
1D. Papp, M. Zhendona, and B. Levente. "Embedded systems security: Threats, vulnerabilities, and attack
taxonomy," p.145.
2 Rao, Goutham P., Robert A. Rodriguez, and Eric R. Brueggemann. "Method and systems for securing
remote access to private networks," p. 18.
Document Page
implementation of robust security policies for remote access that protect the system from
malicious attacks.
At a glance, remote connections may be beneficial but they may also be dangerous at
times. If not properly managed, it may cause malware infections into the system. Users’ devices
may also be a threat to the system. However, these threats can be overcome by restricting users
and enacting system access policies.
Document Page
Bibliography
Papp, Dorottya, Zhendong Ma, and Levente Buttyan. "Embedded systems security: Threats,
vulnerabilities, and attack taxonomy." In 2015 13th Annual Conference on Privacy,
Security and Trust (PST), pp. 145-152. IEEE, 2015.
Rao, Goutham P., Robert A. Rodriguez, and Eric R. Brueggemann. "Method and systems for
securing remote access to private networks." U.S. Patent 8,291,119, issued October 16,
2012.
chevron_up_icon
1 out of 4
circle_padding
hide_on_mobile
zoom_out_icon
logo.png

Your All-in-One AI-Powered Toolkit for Academic Success.

Available 24*7 on WhatsApp / Email

[object Object]