Question

In: Computer Science

What are the additional elements required of a network architecture if the enclave is to support...

What are the additional elements required of a network architecture if the enclave is to support remote access through the public Internet?

True or false: A thin client is a PC or laptop without a hard drive or storage space.

What are the five elements of a Remote Access Security Readiness Review

Solutions

Expert Solution

(1) The additional elements required of a network architecture if the enclave is to support remote access through the public internet are: -

a) - Policy management

b) - Remote access server

c) - VPN Gateway

(2) TRUE, A thin client is a PC or laptop without a hard drive or storage space.

(3)  The five elements of a Remote Access Security Readiness Review are -

1) Access a secure browser(HTTPS) portal application running on the firewalls. This requires an additional authentication.

2) Use a secure socket layer(SSL)14 VPN session between the remote client and the plant DMZ firewall and restrict application usage to a remote terminal session15 over HTTPS.

3) Utilise intrusion detection and prevention system on the firewall to inspect traffic to and from the remote access server for attacks and threats, and appropriately stop them.

4) Allow the remote user to execute, via the terminal session, a selected set of control and automation applications that reside on the remote access server. Application level authentication is required.

5) Implement application security that restricts user from the remote access server to a limited set of application functions(such as read only, non-line offsite functions).


Related Solutions

List and explain the three-tiers security in network architecture?
List and explain the three-tiers security in network architecture?
What six elements are required for communication to occur?
What six elements are required for communication to occur?
What six elements are required for communication to occur?
What six elements are required for communication to occur?
1.define enterprise architecture as a capability in organisations 2. restate business architecture and how to support...
1.define enterprise architecture as a capability in organisations 2. restate business architecture and how to support the business to deliver strategic business outcomes 3. Demonstrate an understanding of the components of the CSVLOD Model of Enterprise Architecture: considerations, standards, visions, landscapes, outlines and designs. 5. Review and evaluate how Governments’ use enterprise architecture to deliver citizen services 6. evaluate and investigate key trends impacting organisations today and how enterprise architects respond to these trends. can you make a essay including...
1) Define the following concepts: computer network, network architecture, protocol, and multilayer protocol. 2) As an...
1) Define the following concepts: computer network, network architecture, protocol, and multilayer protocol. 2) As an IT professional who works in the networked world describe the professional, social, economic, and cultural issues of computer networks. 3) As an IT professional who works in the networked world describe the ethical issues and your social responsibility.
Network architecture: Categorize each of the following requirements as core/fundamental, feature, or informational. a. Network must...
Network architecture: Categorize each of the following requirements as core/fundamental, feature, or informational. a. Network must support Fiber Optical interface for all devices on the network b. Network backbone should be upgradable in capacity to 10Gb/s within two years of deployment c. Finance department requires firewall protection to the server. d. Existing network consists of 10BaseT Ethernet and FDDI segments. e. Network personnel would like to be able to bill users for network service. f. Network core may generate or...
Briefly compare, highlighting the differences, the architecture of the Internet with that of the telephone network.
Briefly compare, highlighting the differences, the architecture of the Internet with that of the telephone network.
What are the differences between WLAN (802.11) and Bluetooth BR/EDR (802.15.1) in terms of network architecture,...
What are the differences between WLAN (802.11) and Bluetooth BR/EDR (802.15.1) in terms of network architecture, medium access control and QoS guarantee?
A number of security devices can be placed at appropriate places in the network architecture to...
A number of security devices can be placed at appropriate places in the network architecture to address certain level of security. In reference to this context, explain how a switch can be configured to monitor traffic flowing along its ports.
A number of security devices can be placed at appropriate places in the network architecture to...
A number of security devices can be placed at appropriate places in the network architecture to address certain level of security. In reference to this context, explain how a switch can be configured to monitor traffic flowing along its ports.
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT