Remote Access Across The Network example essay topic

557 words
Nowadays the Internet and networks are not only the technical means of obtaining information they are also playing a major role in the sphere of business. More and more companies now opt for new Internet-based and -powered e-business initiatives, i.e. online commerce, supply-chain management, extra net collaboration etc. Such new technology as the remote access provides users of corporate LAN with remote connection solutions. It allows to connect and utilize the company's resources regardless physical or geographical location, which implies two major advantages the reduction of costs and no effect on productivity when employees are out of office. Providing remote connections to the networks via the Internet gives an entirely new meaning to keeping business critical information and resources secure.

It is absolutely necessary that companies develop and implement solutions that ensure the security and reliability of the remote systems. The amount of remote access security an organization might need varies from simple to complex according to the business challenges and costs. Remote access threats include data intrusion, system damage, and data destruction. Hackers or employees can gain unauthorized access to trade secrets, company data, and classified information, as well as damage stored information. Remote access obviously relies on the use of an open system, the Internet. This is one of the reasons there are so many significant security threats associated with remote access.

A recent survey conducted by Cisco, CMG I, and Verio found that as many as three quarters of businesses on the Web have at least one of 20 widely known security holes. The increasing complexities surrounding new remote access systems and technologies, have resulted in a wide range of security vulnerabilities for administers to combat, i.e. weak or multiple passwords, authentication data observation and replay, dial-back spoofing and so on. (Remote Access Security, Glen Doss, 2000) There are many options available for securing remote access networks, and here only few are listed. First, restricted address implies that only users with a valid address have access to the network. This is the first security line and cannot prevent stealing of equipment or forged addresses.

Firewall protection is useful because individual packets can be inspected for type, source and destination. They may be quite complex, however, and it is difficult to be sure all possibilities are covered. Caller ID will allow the server to check the phone number against an approved list and is an efficient method but cannot be extended to remote access across the network, while Callback allows for remote users to identify themselves through user name and password authentication. The server then terminates the call and calls back a predetermined number. This is a useful function but can slow the network down and is useless if the remote worker is calling from a temporary site. PAP (Password Authentication Protocol) is where passwords are transmitted at the start of a call, the downfall is that they can be easily snooped.

CHAP (Challenge Handshake Authentication Protocol). This challenges the user with periodic handshakes, again it can be easily snooped as it is in pure text form. RADIUS (Remote Authentication Dial-In User Service) provides central management to the authentication servers. (Remote access buyers' guide - Distant connections, Network News, 1999).