In: Computer Science
1. What are some common risks, threats, and vulnerabilities found
in the Remote Access Domain that must be mitigated through a
layered security strategy?
2. What default configuration should be placed on host-based
firewalls when accessing the network remotely?
3. What risks, threats, and vulnerabilities are introduced by
implementing a remote access server?
4. What is a recommended best practice when implementing a remote
access policy server user authentication service?
5. What is a Remediation LAN?
1) Some common risks, threats, and vulnerabilities found in the Remote Access Domain that must be mitigated through a layered security strategy are the following:
(i) The confidentiality of private data is compromised.
(ii) There can be unauthorized remote access to programs, data and IT systems.
(iii) The laptop of a mobile worker can be stolen.
(iv) External hosts can get entry to internal resources.
2) The deny-by-default rule sets should be placed for arriving traffic on host-based firewalls while remotely accessing the network. It will put a stop to malware incidents.
3) The risks, threats, and vulnerabilities introduced by implementing a remote access server are the following:
(i) External hosts can get entry to internal resources.
(ii) A user can eavesdrop on the communications happening over the remote access without any authorization. He/she can even manipulate the communications if the server is compromised.
4) A recommended best practice when implementing a Remote Access Policy server user authentication service is the following:
(i) Usage of multi-factor authentication.
5) A Remediation local area network (LAN) can be defined as a network which has tools like a remediation server to quarantine non-compliant systems or computers from an untrusted local area network to a trusted local area network.
Please comment in case of any doubt.
Please upvote if this helps.