Question

In: Computer Science

1. What are some common risks, threats, and vulnerabilities found in the Remote Access Domain that...


1. What are some common risks, threats, and vulnerabilities found in the Remote Access Domain that must be mitigated through a layered security strategy?
2. What default configuration should be placed on host-based firewalls when accessing the network remotely?
3. What risks, threats, and vulnerabilities are introduced by implementing a remote access server?
4. What is a recommended best practice when implementing a remote access policy server user authentication service?
5. What is a Remediation LAN?

Solutions

Expert Solution

1) Some common risks, threats, and vulnerabilities found in the Remote Access Domain that must be mitigated through a layered security strategy are the following:

(i) The confidentiality of private data is compromised.

(ii) There can be unauthorized remote access to programs, data and IT systems.

(iii) The laptop of a mobile worker can be stolen.

(iv) External hosts can get entry to internal resources.

2) The deny-by-default rule sets should be placed for arriving traffic on host-based firewalls while remotely accessing the network. It will put a stop to malware incidents.

3) The risks, threats, and vulnerabilities introduced by implementing a remote access server are the following:

(i) External hosts can get entry to internal resources.

(ii) A user can eavesdrop on the communications happening over the remote access without any authorization. He/she can even manipulate the communications if the server is compromised.

4) A recommended best practice when implementing a Remote Access Policy server user authentication service is the following:

(i) Usage of multi-factor authentication.

5) A Remediation local area network (LAN) can be defined as a network which has tools like a remediation server to quarantine non-compliant systems or computers from an untrusted local area network to a trusted local area network.

Please comment in case of any doubt.
Please upvote if this helps.


Related Solutions

what are some of the risks, threats, and vulnerabilities commonly found in the workstation domain?
what are some of the risks, threats, and vulnerabilities commonly found in the workstation domain?
1.Explain the security risks of devices with Remote Desktop access enabled
1.Explain the security risks of devices with Remote Desktop access enabled
1. What are three risks and threats of the User Domain? 2. Why do organizations have...
1. What are three risks and threats of the User Domain? 2. Why do organizations have acceptable use policies (AUPs)? 3. Can Internet use and e-mail use policies be covered in an acceptable use policy? 4. Do compliance laws, such as the Health Insurance Portability and Accountability Act (HIPAA) or GLBA, play a role in AUP definition? 5. Why is an acceptable use policy not a fail-safe means of mitigating risks and threats within the User Domain?
What are system access threats? and some examples.
What are system access threats? and some examples.
What is the current state of wireless security? What are the vulnerabilities? What are the threats?
What is the current state of wireless security? What are the vulnerabilities? What are the threats?
Explain some of the risks and threats to which an enterprise network is exposed.
Explain some of the risks and threats to which an enterprise network is exposed.
Remote access from home is very common for those who workoff-site. What security issues come...
Remote access from home is very common for those who work off-site. What security issues come to mind when establishing this connection? How does this connection protect both you and the corporate network?
What types of threats do smartphones face? Are there any particular vulnerabilities to mobile devices What...
What types of threats do smartphones face? Are there any particular vulnerabilities to mobile devices What qualities of apps make them a vulnerable security point in smartphone use Are apps more or less likely to be subject to threats than traditional P C software programs?
1. Why is it important for mobile workers and users to know what the risks, threats,...
1. Why is it important for mobile workers and users to know what the risks, threats, and vulnerabilities are when conducting remote access through the public Internet? 2. Why does the mock XYZ Health Care Provider need to define a remote access policy to properly implement remote access through the public Internet? 3. Why is a remote access policy definition a best practice for handling remote employees and authorized users who require remote access from home or on business trips?...
Remote access from home is very common for those who work off-site. What security issues come...
Remote access from home is very common for those who work off-site. What security issues come to mind when establishing this connection? How does this connection protect both you and the corporate network?
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT