Remote access and cryptographic protocols

Assignment Help Basic Computer Science
Reference no: EM131018449

Application: Remote Access and Cryptographic Protocols

Remote access is essential to many organizations; however, it exposes the organization's information systems network to a variety of security threats. There are different countermeasures available to combat such threats and each organization must select the measures that serve it best.

Consider the following scenario: You are a busy software developer for a big IT consultancy and are working on a large IT project. You have not taken any vacation in two years and really need to get away for at least a week. However, given the nature of your job and the deadlines, you need to work for at least a couple of hours on most days of your vacation. As a result, you need remote access to your company's network. 

For this Assignment, prepare a presentation of 16-20 slides considering various modes of remote access, explaining them in terms of risks and benefits, and developing countermeasures to remote access based security threats. Address the following concerns in your presentation:

  • Suppose you use a virtual session (i.e. Citrix or VMware virtual desktop environments) for remote access. This access gives you a desktop session on the organization's intranet.
    • Explain specific details about this solution including which secure protocol it uses.
    • Explain the benefits and drawbacks of the virtual session.
  • Suppose you use a VPN for remote access. This access allows your computer to connect to the organization's intranet directly, like being at the office.
    • Explain specific details about this solution including which secure protocol it uses.
    • Explain the benefits and drawbacks of the VPN.
  • Select two defense countermeasures that would secure your company's network from threats associated with remote access. Justify your selection. Use APA format for your references.

Reference no: EM131018449

Questions Cloud

Does the claim made by r. edward freeman that managers have : Does the claim made by R. Edward Freeman that managers have an obligation to take into consideration the rights and interests of all legitimate stakeholders, above and beyond the law, seem plausible to you? Why, or why not? Explain.
Void increment : If I were to declare a function as follows:     void increment(int* pX); This function WILL be able to alter the value of the integer that was used as the argument.
The current source file or in any source file : a. Determines whether an identifier is known only in the current source file or in any source file with proper declarations.b. Determines the period during which that identifier exists in memoryc. Determines where the identifier can be referenced in ..
Calculate the price elasticity of demand : Calculate the price elasticity of demand when price equals $7500. Should Koko raise or lower the price of ATGM to gain more revenue if the current price is $7500? Why
Remote access and cryptographic protocols : Remote access is essential to many organizations; however, it exposes the organization's information systems network to a variety of security threats. There are different countermeasures available to combat such threats and each organization must sel..
Do you identify with any of the characters or situations : Do you identify with any of the characters or situations? If so, does this sense of identification help or interfere with your response? How so?
Provide user data to a country like china : Should a company such as Yahoo! Provide user data to a country like China, even if it is likely to lead to serious consequences for the user? Why or why not? Support your statements. Citations for all material used should be in APA format.
Why should a firm care about quality : Given the commoditized nature of many markets today, doescustomer relationship management and associated focus on quality, value and satisfaction - make sense?
Identify the date on which the speech was delivered : briefly analyze the speech itself, indicating which form of persuasion--logos, ethos, or pathos--was most dominant. Provide an example to support your assessment.

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Simple math quiz that asks a user

Construct a simple math quiz that asks a user to answer a math problem of your choice. On the form, place one text box (txtAnswer) and two command buttons (cmdAskQuestion and cmdVerifyAnswer).

  Write a program that asks a user for a file name and prints

Write a program that asks a user for a file name and prints the number of characters, words, and lines in that file.

  Explain computer viruses spread by email or other methods

Explain computer viruses spread via email or by other methods. What negative consequences can they have on an organization's operations?

  Indexing for different query types

This group assignment provides an opportunity to gain some practical experience with indexing. The "experiment of the week" assignments are intended to be more open, with your group picking the specific topics to investigate. Basically, this gives..

  Which access database object asks a question about data

Which Access database object asks a question about the data stored in a database and displays specific fields and records that answer the question?

  Implement a double-ended priority queue

1. Generalize the preceding exercise to obtain a k-d heap, in which each item can have k individual keys. You should be able to obtain the following bounds: insert in O(log N), deleteMin in O(2k log N), and buildHeap in O(kN). 2. Show that the k-d he..

  Write a program that tests all fetures of new instruction

Implement a new nonunary instruction in place of NOP called ASLMANY whose operand is the number of times the accumulator is shifted left. Allow immediate, direct, and stack-relative addressing.

  The largest value that can be loaded into register

the largest value that can be loaded into Register Y of HCS12 is

  What are some internal and external factors

Cite at least two successful and two unsuccessful examples of the use of IS/IT for gaining or enhancing competitive advantages.

  Write code that repeatedly asks the user to enter a word

Write code that repeatedly asks the user to enter a word.

  Explain to the organization the potential threats

Explain to the organization the potential threats in their software environments. Describe the various protection efforts available against each threat.

  Build a solid foundation for the design phase of the project

A summary of the system requirements for the project, including cost estimates

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd