Free Essay

Remote Network Access Technology

In: Business and Management

Submitted By ToniPeretta
Words 1041
Pages 5
WHAT IS REMOTE NETWORK ACCESS TECHNOLOGY? or REMOTE ACCESS SERVICE ( RAS )
Remote network access technology allows access to a computer or a network from a remote distance. Employees at branch or satellite offices or telecommuters, and travelling staff members may need access to the company or agency’s network and are able to do so via remote access. Users working from home get access through an Internet service provider (ISP) or Dial-up connection through desktop, notebook, or handheld computer modem over regular telephone lines.
These days almost every company offers some type of remote access to accommodate employees working outside the office and others like business partners, vendors, or external technical support. Remote Access Service (RAS) allows remote clients to dial-in and connect to network as if they were locally connected in the office.
VPN REMOTE ACCESS TECHNOLOGY
VPN (Virtual Private Network) & Tunneling A Virtual Private Network (VPN) is a private connection over a public network such as the Internet. VPNs can save a company a lot of money because it use Internet connection rather than expensive long-distance point-to-point connections such as dial-up, ISDN, and leased lines, to allow remote networks and remote employees to connect to the corporate network.
A site-to-site or LAN-to-LAN VPN as shown below is typically used for connecting branch offices of a single organization or for creating an extranet for business partners. The second main type of VPN is called remote access VPN and is mostly used for remote and mobile users who need to access the corporate network regardless of their location be it at home, at a hotel, on a business trip, or at a business partner’s office. Internet connection is required and VPN client software is installed on the client’s operating system which establishes a tunnel to the corporate network after a connection with a local ISP is established. http://www.techexams.net/technotes/securityplus/ras.shtml

BENEFITS OF REMOTE ACCESS TO EMPLOYERS AND EMPLOYEES
Increase in Productivity
Enabling employees to access the company's network from home means they can work in the evenings instead of staying late at the office to access files and programs on the company's network. Employees can have constant, up-to-date access to details of their company's inventory, products and services making a business more responsive to its customers thereby generating more sales.
Convenience and Security
RAS allows employees to access their computer from anywhere in the globe. They are able to leave their computers at home without worrying about needing to carry data physically on it. If there is a need to access data on the computer, a RAS connection can be used to retrieve the information without compromising security.
Cost Savings for Employers
Remote workers save employers costs on travel, office space, maintenance and parking space requirements.
Cost Savings for Employee
When working from home there is no need for professional clothing, thereby saving lots of money yearly. Same also applies to gas or public transportation, parking, lunches out, dry cleaning, and child care. It is also a tax benefit to have a home office. http://www.computerweekly.com/feature/Can-business-benefit-from-remote-access http://www.flexjobs.com/blog/post/telecommuting-advantages-and-some-disadvantages-for-good-measure/

DRAWBACKS OF REMOTE ACCESS
Security Risks
Without implementing proper procedures, policies and practices, remote accessing a company’s network can pose serious security risks. Common practices should include periodically changing passwords and educating employees about the importance of remote access security. A company’s network is also at risk if an employee’s computer gets affected with a virus or stolen.
Reliability
Remote access networks are open, running networks run over the Internet and therefore not as reliable and efficient as closed networks that run over wires. If the Internet service is performing poorly, it compromises the remote access connection therefore the reliability of the RAS is highly dependent on the internet service. Wi-Fi servers are often slower than wired servers.
Speed
Speed of the service is also dependent on the number of people accessing the network at the same time via RAS. Uploads, downloads and transfers all take longer to complete with higher traffic.

http://www.computerweekly.com/feature/Can-business-benefit-from-remote-access http://www.flexjobs.com/blog/post/telecommuting-advantages-and-some-disadvantages-for-good-measure/ http://www.referenceforbusiness.com/small/Sm-Z/Telecommuting.html#ixzz3Y9dpR3y8 http://www.ehow.com/list_7569718_remote-access-disadvantages.html REMOTE ACCESS TECHNOLOGY SOLUTION PROVIDERS
Hardware - Perle, Extreme Networks, Nortel, Cisco
Software – Avia/ Lucent, VPNet
Firewalls, Routers or Encryption programs - Checkpoint, Netscreen , Watchguard. http://www.ehow.com/list_5779073_advantages-remote-access-vpn.html

WHAT IS PORTABLE EXTERNAL STORAGE TECHNOLOGY?
External storage comprises of portable devices that temporarily stores, backs up, and transports data and information such as personal files, documents, pictures, videos, music etc. from one computer to another. Some people use it to store information that is not needed frequently in preparation for emergencies.
COMMON TYPES OF EXTERNAL STORAGE DEVICES
USB flash drive (or thumb/jump drive) is a data storage device that includes flash memory with an integrated flash Universal Serial Bus (USB) interface. They are removable and rewritable, and physically small, some weighing less than 30 grams (1.1 oz.) They have speed and high capacity and are very flexible because they have no moving parts also making them durable and reliable. Up to one terabyte of storage space is now available on these types of devices and they can last as long as 10-years.
Memory card (or memory stick) is an integrated circuit for storage and transfer of digital data in most electronic devices. It can store data in a variety of forms such as texts, graphics, digital images etc. Memory cards are available in various storage sizes ranging from 4 to 64 Megabytes
External hard drives are usually used in addition with the computer’s internal hard drive in order to store and transport data. An external hard drive is external to the main computer tower but can be connected to the computer via an interface cable, which allows it to communicate with the computer and pass data back and forth. http://en.wikipedia.org/wiki/External_storage http://www.wisegeek.com/what-is-an-external-hard-drive.htm…...

Similar Documents

Free Essay

Network Design for Remote Monitoring

...capstone project is to recommend a Windows networked environment to facilitate the remote monitoring of neuro-surgeries. As a consultant I was approached by XYZ-Monitoring to assist in the design of a network from the ground up that would support the remote monitoring of neuro-surgeries using Cadwell Laboratories’ Cascade system. XYZ-Monitoring (herein referred to as XYZ) wanted a Windows network that would be integrated with their existing Cisco ASA firewall device. XYZ wanted to use a virtualized environment because they had a limited budget for new hardware. They needed a secure solution that would meet HIPAA requirement concerning the security of patient data. XYZ requires all users to connect to their environment through a VPN connection bound to the Cisco ASA firewall. They have three user groups that will need to have access to the environment; however, they have multiple clients that need to remain separated when connected to the network. Given these requirements by XYZ, it was clear they wanted an Active Directory integrated environment so that users would be grouped by job function and by client. XYZ would need at least three high level Organizational Units (OUs), one for each job function; they would also potentially need an OU for each client. They would need Group Policy Objects (GPOs) to provide ease of administration once the design was complete as well as provide access policies to the environment based on job function. Provided with these......

Words: 5873 - Pages: 24

Premium Essay

Remote Access Policies

...Remote access policies validate a number of connection settings before authorizing the connection, including the following: • Remote access permission • Group membership • Type of connection • Time of day • Authentication methods • Advanced conditions: ◦ Access server identity ◦ Access client phone number or MAC address ◦ Whether user account dial-in properties are ignored ◦ Whether unauthenticated access is allowed After the connection is authorized, remote access policies can also be used to specify connection restrictions, including the following: • Idle timeout time • Maximum session time • Encryption strength • IP packet filters • Advanced restrictions: ◦ IP address for PPP connections ◦ Static routes Additionally, you can vary connection restrictions based on the following settings: • Group membership • Type of connection • Time of day • Authentication methods • Identity of the access server • Access client phone number or MAC address • Whether unauthenticated access is allowed For example, you can have policies that specify different maximum session times for different types of connections or groups. Additionally, you can specify restricted access for business partners or unauthenticated connections. Authorizing access There are two ways to use remote access policies to grant authorization: 1. By user 2....

Words: 360 - Pages: 2

Premium Essay

Remote Access Attacks

...1. Analyze the Quick Finance Company Network Diagram and describe the assumptions you will need to make in order to identify vulnerabilities and recommend mitigation techniques as there is no further information from this company. The company does not wish to release any security related information per company policy. Vulnerability is the intersection of three elements: a system susceptibility or flaw, attacker access to the flaw, and attacker capability to exploit the flaw (U.S. Airforce) therefore my assumptions on the network diagram shows that there are vulnerabilities that may exist as a weakness in the automated systems, security procedures, administrative controls, and /or internet controls of the finance company there could also exist hardware vulnerabilities that could lead to unprotected storage of hardware the solution is to store all hardware at the recommended temperature, software vulnerability can occur with insufficient testing and a lack of audit trail solution will be to test and secure all software used and update software as appropriate, audit trails enable security relevant chronological records of activities that occur in the software. There could be network vulnerability with unsecure network architecture and unprotected communication lines the solution will be to install and configure network security equipment to curb these issues. Personnel can be compromised and may be used to create problems either directly or indirectly on the system a......

Words: 964 - Pages: 4

Premium Essay

Remote Access Control Policy Definition

...Remote Access Control Policy Definition Introduction to Information Security Remote access is the ability to log onto a network from a distant location. Generally, this implies a computer, a modem, and some remote access software to connect to the network. Whereas remote control refers to taking control of another computer, remote access means that the remote computer actually becomes a full-fledged host on the network. The remote access software dials in directly to the network server. The only difference between a remote host and workstations connected directly to the network is slower data transfer speeds. The purpose of a remote access policy is to define the standard connection to the company’s network from any remote host, untrusted host and remote network, including untrusted hosts on the company’s intranet. These standards are designed to minimize the potential exposure to the company’s from damages, which may result from unauthorized use of the company’s resources. At the main location, a set switches and routers are interconnected to from a Wide Area Network. The switches can be connected in different topologies. All remote users must follow the security requirements set forth in the standard for the company’s remote host accessing Information Technology Resources prior to such access, as well as any guidelines, procedures or other requirements issued by the Information Technology Department. Within the virtual private network multiple Virtual Private Network......

Words: 660 - Pages: 3

Free Essay

Network Technology

...A network switch is a small hardware device that joins multiple computers together within one local area network (LAN). Ethernet switch devices were commonly used on home networks before home routers became popular; broadband routers integrate Ethernet switches directly into the unit as one of their many functions. High-performance network switches are still widely used in corporate networks and data centers. Advantages Switches have increased available network bandwidth. There is reduced workload on individual computers. Increased network performance. There are fewer packet collisions. And some disadvantages are: They are significantly more expensive. Network problems can be difficult to trace through a switch. Broadcast traffic. Below is a diagram showing how switchg/hub are interconnected in a network A hub is a device for connecting machines into a network. It is a non-intelligent connection but tends to be very cheap. It allows all machines to send packets to every machine connected and wait for the required machine to reply. This causes delays as all the ports are used for every transmission. A network switch is the more recent method. This has intelligence and remembers which machines are connected to each port, so it passes any transmission straight to the correct port. This reduces collisions on the network when it is busy and is therefore much faster. It is more expensive, although nowadays there is very little difference in price. A......

Words: 1379 - Pages: 6

Premium Essay

Remote Access Control Policy Definition

...The following are types of Remote Access Control Policy I would like to put into place to make sure our company’s data is secure. We need to get the right security measures so the correct people can have access to the data they need to do their job. I would start by setting up a Remote Authentication Dial-In User Service (RADIUS), a VPN, Firewall, Local Biometrics, RSA – F.O.B. by using a security key carried by the employee or set it up on the local server. I would start in the Main office that is located in Phoenix, AZ by install a RADUIS, this is a client/server protocol that runs in the application layer and will connect all the employee and visitor to the server. In the main office, we need to set up a database with all username and passwords for the employees’. At all the satellite facilities, we need to set up the proper VPN, Firewall protection as well as setting up some type of biometric logon system or a random number generator where a user will be given a security key and they will need to input that when they log on to the system. We need to set up the password system to reset every 3 months and set up a password remembrance. For the mobile devices that the sales department will need, I would suggest to encrypt the local hard drives if stolen and set up biometric thumb scanner as well as a security key require to log on to their systems....

Words: 261 - Pages: 2

Free Essay

Network Technologies

...Network Topologies are in essence the way the network is laid out as it relates to the devices that are connected to it. If you could view all the devices connected to the network, the arrangement would suggest which type the network topology it falls within. The topologies can be described as either a physical or logical design in their defined layout. Network topologies are grouped in the following design categories, Mesh, Bus, Ring and Star Topologies. A mesh topology comes in two varieties, Full mesh and Partial mesh. Full mesh consists of connectivity between every node on the network, meaning each has a direct path to the other. A partial mesh topology consists of the same type of connectivity as a full mesh except you may have to cross nodes to reach another, meaning that direct connectivity may not exist. Mesh topologies rely on routing to be able to choose the correct path between the hosts. One of the largest mesh topologies is the Internet itself. While you may not have a direct connection to a web server, the routers in the path know exactly the best path to get you there. Mesh topologies are considered highly available or redundant. With multiple paths to a destination, one can fail and your connectivity will remain. This leads to mesh networks being very complex. Being complex makes them harder to troubleshoot when issues arise. Along with additional routing overhead and connections, mesh topologies tend to be the most expensive to deploy of the topologies......

Words: 1054 - Pages: 5

Free Essay

Network Access Control

...Network Access Control (NAC) is a computer networking solution that uses a set of protocols to define and implement a policy that describes how to secure access to network nodes by devices when they initially attempt to access the network.[citation needed] NAC might integrate the automatic remediation process (fixing non-compliant nodes before allowing access) into the network systems, allowing the network infrastructure such as routers, switches and firewalls to work together with back office servers and end user computing equipment to ensure the information system is operating securely before interoperability is allowed. A basic form of NAC is the 802.1X standard. Network Access Control aims to do exactly what the name implies—control access to a network with policies, including pre-admission endpoint security policy checks and post-admission controls over where users and devices can go on a network and what they can do. In plain English[edit] When a computer connects to a computer network, it is not permitted to access anything unless it complies with a business defined policy; including anti-virus protection level, system update level and configuration. While the computer is being checked by a pre-installed software agent, it can only access resources that can remediate (resolve or update) any issues. Once the policy is met, the computer is able to access network resources and the Internet, within the policies defined within the NAC system. NAC is mainly used......

Words: 298 - Pages: 2

Premium Essay

Remote Access Control Policy

...Remote Access Control Policy Definition What is remote access? Remote access is the ability to log onto a network from a distant location. What that means that a computer, a modem, and some kind of remote access software is required to connect to the network. But remote control refers to actually taking control of another computer, whereas remote access means that the remote computer has the ability to become a hot on the network. When you use remote access software it will directly dial into the network server. There is a difference between a remote host and workstations that are connected directly to the network is the slower data transfer speeds. What the purpose behind a remote access policy is to define the standard hosts on the company’s intranet from the remote host, non-trusted hosts (on the company’s intranet too), and remote network. These standards are setup to minimize any potential exposure to the company’s network and data from any damages, which are a result of unauthorized access by attackers through the network, virus, software, and more. When it comes to the main location of the company, it will have a Wide Area Network (WAN), along with the WAN there will be a set of switches and routers connected to and from the WAN. This allows for the switches to be connected to different topologies. A Virtual Private Network (VPN) will be created using Internet Protocol (IP) by the company’s IT department. Within the VPN there will be other VPN routers will......

Words: 889 - Pages: 4

Premium Essay

Nt2580 Remote Access Policies

...NT2580 Week 2 Essay Create a Remote Access Policy Definition NT2580 The requirements for establishing a secure connection between remote locations vary between organizations. The needs of the organization are based on the type of information and data being transferred, as well as the sensitivity of the information. There are several options available to networks to get their data sent securely and reliably. All seven layers of the OSI model must be taken into account when designing secure Remote Access Control Policies. In order to create a secure remote connection between offices in Atlanta, San Francisco, Chicago, and Dallas, a WAN link would be the best type of connection. A dedicated WAN link would offer the organization a secure, reliable, dedicated P2P type of connection. Wide Area Network links would be monitored by the owners of the lines that connect each location. Leased lines from the providers will allow for scalability with potential growth. The downside to this type of connection is the expense and an internet connection is not necessarily provided by the link. In order to add to the security of the network physical and logical access controls are necessary. Logical implementations added to the network will be Acceptable, Email, and Wireless Use policies, Antivirus and firewall software, as well as Extranet, Interconnection, and Host Security. In order to ensure the physical assets, as well as employees, physical security must also be considered.......

Words: 704 - Pages: 3

Premium Essay

Remote Access

...Purpose This remote access policy is designed to prevent damage to the organizational network or computer systems and to prevent compromise or loss of data. Approval Any remote access using either dial-in, VPN, or any other remote access to the organizational network must be reviewed and approved by the appropriate supervisor. All employees by default will have account settings set to deny remote access. Only upon approval will the account settings be changed to allow remote access. Remote Computer Requirements 1. The anti-virus product is required to be operating on the computer at all times in real time protection mode. 2. The anti-virus library definitions shall be updated at least once per day. 3. Anti-virus scans shall be done a minimum of once per week. No one should be able to stop anti-virus definition updates and anti-virus scans except for domain administrators. 2. The computer must be protected by a firewall at all times when it is connected to the internet. Several popular choices include Zone Alarm, the Windows XP firewall, and Norton Personal firewall. Remote Connection Requirements The remote user shall use either dial-In or virtual private networking (VPN). Dial-In is typically used when the user in in a local calling area. VPN is typically used when the user would need to dial a long distance number to connect with a dial-in connection. VPN uses a local connection to an internet service provider (ISP) and creates a tunnel through the......

Words: 569 - Pages: 3

Premium Essay

Remote Access Control Policy

...Remote Access Control Policy The Remote Access Control Policy for Richman Investments is designed to protect the confidentiality and integrity of our corporate and customer information. All remote sessions, including internal wireless access will utilize PKI certificates from a public trusted third party vendor using encrypted tunnels on the Internet. Site-to-Site data exchanges will be conducted using IPSec encrypted Tunnels. Customer Remote Access These Connections must allow the customer to securely exchange information with our Web Server applications. The Web Servers will be place on the Corporate DMZ and the Database Servers on the interior corporate LAN. Web to Database traffic will be encrypted. The Web Servers will have PKI certificates from a trusted third party vendor to eliminate spoofing. Data will be encrypted using SSL connections initiated on the customer’s Browser to maintain confidentiality. The customer will need to supply a username and password which the Web browser will pass to a RADIUS Server for Authentication, and Access permissions prior to granting access to protected areas of the Website. Employee Access All Employee Connections, internal and external, to the Internal LAN at all sites will utilize Two Party Authentication to minimize the risks of utilizing passwords as the primary access method. Employees will have a employees will have a onetime pass key generating token (Ex. RSA) and PIN in addition to their Username and Password to......

Words: 510 - Pages: 3

Premium Essay

Network Technology Concepts

...Networking Technology Concepts Capella University Abstract The purpose of my paper is to explain the concepts of networking technology and what impact these concepts have in an organization. A number of these concepts embody, but are not restricted to, improved communication, enlarged productivity, and enhanced mobility. In addition, what part does network architecture play in developing network technology? In doing thus, I will be able to justify the aim and role that standard-setting organizations play in establishing network standards and identify two standards in network technology and outline their roles. Explain the importance of the ISO (International Organization for Standardization) and show how they contribute to the advancement of the network industry. Keywords: technology, ISO, networking, architecture, concepts Networking Technology Concepts The basic concepts of networking technology are to improve communication, increase efficiency, and enhanced mobility. In addition, network architecture falls in line with these concepts because architecture is the foundation or the framework to configure networks. Improve Communications Technology is important because it expands communications in the workplace. Employees are no longer limited to using regular landline phones, couriers or snail mail. Technology has evolved tremendously whereas, you are able to start communicating electronically using computers, smartphones and other forms of electronic devices......

Words: 617 - Pages: 3

Premium Essay

Remote Access Control Policy Definition

...Remote access security policy involves the policies and conditions that are in place that allow users to connect to servers when out of the network. In the case of Richman industries, they are interested in maintaining connections with their users, and sharing app data that is on a server for their day to day operations. In their case, I would have access policy that is based on Explicit Allow policies. This means that the policy grants “Permission” to access the servers remotely if the connection attempt matches the policy conditions. Some of the requirements would include strict control enforced via one-time password authentication or public keys with strong pass-phrases. Also, anyone trying to gain access must not be connected to any other network at the same time, aside from personal home networks under the user's complete control. Further, employees with access must not use email accounts other than the company's standards, so that personal use won't be confused with business. Users must have approved virus control and spyware protection in place on all devices accessing the company network. Remote access will be limited in certain areas, while at least Applications will be approved for access (Shared application data is an important part of Richman’s network). Systems and system settings will not be accessible from remote, out of network connections, to protect from outside alterations of systems or system settings, and any Data access will be read only, with......

Words: 300 - Pages: 2

Premium Essay

Richman Investment Remote Access Security Policy

...Richman Investment’s Remote Access Security Policy 1) Wireless Access At Richman Investment’s when the network is accessed remotely via wireless appropriate wireless security standards will be used. • Wired Equivalency Protocol (WEP) will be used as standard on Wi-Fi connections. • A WEP encryption key will be used. • The network will be configured not to advertise its presence. • The power of access points will be turned down to a minimum that still allows the access point to function. • Due to the possibility of cracking Wireless Encryption Protocol using sniffing software such as AirSnort all wireless access points will be outside the firewall. • Wi-Fi Protected Access (WPA) will be used where it is available. 2) Secure Access via VPN Access from remote users to the corporate network will be via secure IPSEC VPN or SSL VPN connections only. This is necessary to secure the connection from the remote device to the corporate network. 3) Prevention of Data Loss All laptops and PDA’s that are taken off site will have the following security configured, to prevent data loss in the event of theft. • The hardware password will be enabled if available. • All corporate data on the laptop or PDA will be encrypted using appropriate encryption software. • Sensitive documents will be accessed remotely and not downloaded to the laptop or PDA. 4) Remote Device Protection To prevent remote PC’s, laptops, PDA’s etc from compromising...

Words: 349 - Pages: 2