Question

In: Computer Science

1.Explain the security risks of devices with Remote Desktop access enabled

1.Explain the security risks of devices with Remote Desktop access enabled

Solutions

Expert Solution

Answer :-

The Remote Desktop Protocol(aka RDP) is a proprietary protocol developed by Microsoft that is used to provide a graphical means

of connecting to a network - connected computer.

RDP is a protocol for dangling your keyboard , mouse and a display for others to use. As ypu might expect , a juicy protocol like this has a variety of knobs used to control its security capabilities ,including controling user authentication , what encryption is used , and more.

When dealing with RDP protocol , there are (by default) several vulnerabilities and security risks you should know:-

1. Man-in-the Middle(MiTM)

2. Encryption Attack

3. Denial of service(DOS) Attack

4. RDS Misconfiguration

5. Ransomware

6. Brute-Force Attack

1. Man-in-the Middle(MiTM)

Although the remote desktop service provides data encryption between the client and server by default , it doesn't provide authentication for verifying the identity of the terminal/RDSH server.

This lack of identity verification allows a malicious person, by deploying other nefarious activities, to intercept all communications

sent between client and a terminal server.

The likelihood of this type of attack depends on a hacker's ability to control connections between the client and the terminal server.

Typically,this requires the criminal to perform other attacks such as ARP(Address Resolution Protocol) spoofing or DNS (Domain Name System) spoofing , which redirect connections to the attacker prior to sending the data to the legimate server.

2. Encryption Attack

By default, the remote desktop service uses an encryption setting of client compatible(medium).

This level of encryption encrypts data sent between the client and the server at the maximum key strength supported by the client .

It's generally used in an environment containing mixed or earlier-version clients.

The medium setting may facilitate the use of weak encryption which could be decrypted ina reasonable time-frame and lead to the

disclosure of sensitive information.

3. Denial of service(DOS) Attack

Terminal servers which support network level authentication (NLA) but do not have it configured present a risk.

NLA forces the clients computers to present user credentials for authentication before the server will create a session for that user.

As session creation is relatively resource intensive, NLA provides a layer of defense against denial of service attacks,

whereby a malicious user makes repeated connections to service to prevent its legimate use by others.

4. RDS Misconfiguration

If user misconfiguaration RDS protocol in their divices then there is probability for attack.

All RDSH servers must be hardend and locking down to avoid any risk related to RDS misconfiguaration.

5. Ransomware

Ransomeware attacks are getting more targeted to be more effective.And one of the primary attack vectors is the Remote Desktop

Protocol(RDP).Remote desktop is exactly what the name implies, an option to remotely control a PC.

And with the currently-availabe software,it almost feels as if you were actually sitting behind that PC- with is what makes it so dangerous.

6. Brute-Force Attack

RDP become vulnerable to Brute-force attack when using a weak passwords.

It's recommended to define and enforce a strong password policy for all remote desktop users that connect to your RDS collection.

RDP, if not properly configured and secured, can act as a gateway within an organization for cybercriminals to access sensitive internal resources.
Attackers can also exploit vulnerable RDP services to perform remote code execution and seize control over targeted gateways.

so,In this way security risks of devices while Remote Desktop access enabled .


Related Solutions

ASSIGNMENT It is recognized that insiders pose security risks due to their legitimate access to facilities...
ASSIGNMENT It is recognized that insiders pose security risks due to their legitimate access to facilities and information, knowledge of the organization and the location of valuable assets. Insiders will know how to achieve the greatest impact whilst leaving little evidence. However, organizations may not have employed effective risk management regimes to deal with the speed and scale of change, for example the rise of outsourcing. Outsourcing can lead to the fragmentation of protection barriers and controls and increase the...
Remote access from home is very common for those who workoff-site. What security issues come...
Remote access from home is very common for those who work off-site. What security issues come to mind when establishing this connection? How does this connection protect both you and the corporate network?
Remote access from home is very common for those who work off-site. What security issues come...
Remote access from home is very common for those who work off-site. What security issues come to mind when establishing this connection? How does this connection protect both you and the corporate network?
Rocket Products manufactures three types of remote control devices
Rocket Products manufactures three types of remote control devices: Economy Standard, and Deluxe. The company, which uses activity-based costing, has identified five activities (and related cost drivers). Each activity, its budgeted cost and related cost driver is identified below. ActivityCostCost DriverMaterial handling$ 225,000Number of partsMaterial insertion2,475,000Number of partsAutomated machinery840,000Machine hoursFinishing170,000Direct labor hoursPackaging170,000Orders shipped Total   $3,880,000 The following information pertains to the three product lines for next year: Units to be producedEconomyStandardDeluxeOrders to be shipped10,0005,0002,000Number of parte per unit1,000500200Machine hours per unit135Labor hours per unit222Assume...
HiTech Products manufactures three types of remote control devices Economy.
HiTech Products manufactures three types of remote control devices Economy. Standard and Deluxe The company, which uses activity-based costing, has identified five activities (and related cost drivers). Each activity, its budgeted cost, and related cost driver is identified below ActivityCostCost DriverMaterial handling$ 225,000Number of partsMaterial insertion2,475,000Number of partsAutomated machinery840,000Machine hoursFinishing170,000Direct labor hoursPackaging170,000Orders shipped Total   $3,880,000 The following information pertains to the three product lines for next year: Units to be producedEconomyStandardDeluxeOrders to be shipped10,0005,0002,000Number of parte per unit1,000500200Machine hours per unit135Labor hours per unit22217....
Explain in at least a paragraph What are the risks associated with a pervasive security infrastructure?...
Explain in at least a paragraph What are the risks associated with a pervasive security infrastructure? What are the reasons for NOT having such infrastructure? What are the alternatives?
explain the potential complication of dysrthmias and pneumothorax/hemothorax associated with central venous access devices and identify...
explain the potential complication of dysrthmias and pneumothorax/hemothorax associated with central venous access devices and identify nursing interventions aimed at preventing and treating this particular complication.
Compare “Application of RPM (Remote patient monitoring) devices to the patient with chronic diseases” that was...
Compare “Application of RPM (Remote patient monitoring) devices to the patient with chronic diseases” that was limited mostly by activities with Telehealth for education and training that was limited mostly by resources. Which would be more challenging? Why?
How could you reduce the costs of your remote access service?
How could you reduce the costs of your remote access service?
For tablet and desktop devices, you’ll lay out the horizontal navigation list as a single row...
For tablet and desktop devices, you’ll lay out the horizontal navigation list as a single row of links. Within the media query, create a style rule that displays the ul element within the horizontal navigation list as a flexbox, oriented in the row direction with no wrapping. Set the height of the element to 40 pixels For each li element within the ul element of the horizontal navigation list set their growth, shrink, and basis size values to 1, 1,...
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT