Information Security: Remote Access Technologies, Risks, & Defenses

Verified

Added on  2022/11/13

|18
|1310
|193
Report
AI Summary
This report provides a comprehensive overview of remote access technologies, focusing on virtual sessions and VPN systems. It delves into the functionalities of each mode, highlighting their advantages and disadvantages. The report emphasizes the security risks associated with remote access, such as data breaches, cyberattacks, and malware threats. It examines the secure protocols used by each technology, like Transport Layer Security (TLS) for virtual sessions and STTP for VPNs. The report identifies common vulnerabilities, including configuration conflicts and DOS attacks, and proposes defense mechanisms like encryption and the use of authentic networks. The conclusion reinforces the importance of secure practices in remote access, recommending the adoption of encryption techniques and the utilization of trusted networks to mitigate potential threats. The report also includes a detailed list of references to support its findings.
Document Page
INFORMATION SECURITY
TECHNOLOGIES
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
INTRODUCTION
The term remote access is the ability to access a
computer network through wireless connections.
It is an essential part of every organization that
provides a platform to access networks from any
location.
The purpose of the study is to describe various
kinds of remote access systems and security risks
linked with remote access.
Document Page
MODES OF REMOTE ACCESS
It is identified that there are major two kinds of
modes used for remote access such as:
A virtual session
A VPN system
Both these are effective modes of remote access
which can be used in the organization to perform
and run computer networks by using wireless
networks.
Document Page
A VIRTUAL SESSION
A virtual session is defined as a process which is
used to connect employees with computer
devices through virtual connections.
Such kind of process is more effective which
provide desktop session to the employees.
Citrix and Vmware both are very best examples of
the virtual session that can be used as remote
access in the organization (Stallings, Brown,
Bauer, & Bhattacharjee, 2012).
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
A VIRTUAL SESSION
A recent study identified that virtual sessions are
software extension which can be utilized to
control and monitor computer systems from any
location.
For implementing virtual session there are two
types of steps are used such as computer server
and employees module.
The security is the biggest concern in the virtual
session which creates a problem for employees
and organizations (Wang, & Kissel, 2015).
Document Page
SECURE PROTOCOL USED BY VIRTUAL
SESSION
It is identified that a transport layer security
protocol is used by a virtual session in order to
improve the security of remote access.
Such kind of protocol install and register a server
certificate on all delivery controllers and
configure a port with networks.
It is a more effective and secure protocol that
provides a way to the companies for monitoring
computer devices in an effective manner.
Document Page
ADVANTAGES OF VIRTUAL SESSION
There are numerous advantages of virtual
sessions which are described below:
More effective and appropriate
Easy to control and manage
Can be used for connecting two or more computer
devices with each other
Provide long distance communication
Virtually connect employees with computer networks
More flexible and reliable
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
DISADVANTAGES OF VIRTUAL SESSIONS
There are following drawbacks of virtual sessions:
Less secure
Increase data breach and cyber-attacks
Connection may be lost
Require proper internet connectivity
Can be affected the performance of computer devices
Document Page
VPN SYSTEM
The term VPN refers to the virtual private network
which is used by many companies to virtually
connecting computer devices with each other.
It enables consumers to exchange information
between computer networks across public
networks.
It also allows companies and users to access their
computer devices from any location.
Document Page
VPN SYSTEM
It is analysed that VPN access provides a way for
the employees to link their computers with the
organization's networks.
A recent study argued that a VPN is a secure
tunnel between computer devices and internet
connections (Kist, et al., 2014).
By using such kind of mode employees and
consumers can perform remote access tasks
effectively.
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
SECURE PROTOCOL USED BY VPN
It is observed that VPN networks use STTP
protocol for improving security networks.
The term STTP refers to the secure socket
tunnelling protocol which provides a process to
secure and protect computer devices.
Moreover, STTP protocol is a faster and
appropriate process for organizations and VPN
networks.
Document Page
ADVANTAGES OF VPN
There are various advantages of VPN networks
which are described below:
Improve efficiency of remote access
Provide wireless connections to the networks
More scalable
Connect two or more devices with each other
Improve flexibility of networks while transferring data
from one network to another.
chevron_up_icon
1 out of 18
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]