Remote access and cryptographic protocols

Assignment Help Basic Computer Science
Reference no: EM131018449

Application: Remote Access and Cryptographic Protocols

Remote access is essential to many organizations; however, it exposes the organization's information systems network to a variety of security threats. There are different countermeasures available to combat such threats and each organization must select the measures that serve it best.

Consider the following scenario: You are a busy software developer for a big IT consultancy and are working on a large IT project. You have not taken any vacation in two years and really need to get away for at least a week. However, given the nature of your job and the deadlines, you need to work for at least a couple of hours on most days of your vacation. As a result, you need remote access to your company's network. 

For this Assignment, prepare a presentation of 16-20 slides considering various modes of remote access, explaining them in terms of risks and benefits, and developing countermeasures to remote access based security threats. Address the following concerns in your presentation:

  • Suppose you use a virtual session (i.e. Citrix or VMware virtual desktop environments) for remote access. This access gives you a desktop session on the organization's intranet.
    • Explain specific details about this solution including which secure protocol it uses.
    • Explain the benefits and drawbacks of the virtual session.
  • Suppose you use a VPN for remote access. This access allows your computer to connect to the organization's intranet directly, like being at the office.
    • Explain specific details about this solution including which secure protocol it uses.
    • Explain the benefits and drawbacks of the VPN.
  • Select two defense countermeasures that would secure your company's network from threats associated with remote access. Justify your selection. Use APA format for your references.

Reference no: EM131018449

Questions Cloud

Does the claim made by r. edward freeman that managers have : Does the claim made by R. Edward Freeman that managers have an obligation to take into consideration the rights and interests of all legitimate stakeholders, above and beyond the law, seem plausible to you? Why, or why not? Explain.
Void increment : If I were to declare a function as follows:     void increment(int* pX); This function WILL be able to alter the value of the integer that was used as the argument.
The current source file or in any source file : a. Determines whether an identifier is known only in the current source file or in any source file with proper declarations.b. Determines the period during which that identifier exists in memoryc. Determines where the identifier can be referenced in ..
Calculate the price elasticity of demand : Calculate the price elasticity of demand when price equals $7500. Should Koko raise or lower the price of ATGM to gain more revenue if the current price is $7500? Why
Remote access and cryptographic protocols : Remote access is essential to many organizations; however, it exposes the organization's information systems network to a variety of security threats. There are different countermeasures available to combat such threats and each organization must sel..
Do you identify with any of the characters or situations : Do you identify with any of the characters or situations? If so, does this sense of identification help or interfere with your response? How so?
Provide user data to a country like china : Should a company such as Yahoo! Provide user data to a country like China, even if it is likely to lead to serious consequences for the user? Why or why not? Support your statements. Citations for all material used should be in APA format.
Why should a firm care about quality : Given the commoditized nature of many markets today, doescustomer relationship management and associated focus on quality, value and satisfaction - make sense?
Identify the date on which the speech was delivered : briefly analyze the speech itself, indicating which form of persuasion--logos, ethos, or pathos--was most dominant. Provide an example to support your assessment.

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Identifies the cost of computer

identifies the cost of computer components to configure a computer system (including all peripheral devices where needed) for use in one of the following four situations:

  Input devices

Compare how the gestures data is generated and represented for interpretation in each of the following input devices. In your comparison, consider the data formats (radio waves, electrical signal, sound, etc.), device drivers, operating systems suppo..

  Cores on computer systems

Assignment : Cores on Computer Systems:  Differentiate between multiprocessor systems and many-core systems in terms of power efficiency, cost benefit analysis, instructions processing efficiency, and packaging form factors.

  Prepare an annual budget in an excel spreadsheet

Prepare working solutions in Excel that will manage the annual budget

  Write a research paper in relation to a software design

Research paper in relation to a Software Design related topic

  Describe the forest, domain, ou, and trust configuration

Describe the forest, domain, OU, and trust configuration for Bluesky. Include a chart or diagram of the current configuration. Currently Bluesky has a single domain and default OU structure.

  Construct a truth table for the boolean expression

Construct a truth table for the Boolean expressions ABC + A'B'C' ABC + AB'C' + A'B'C' A(BC' + B'C)

  Evaluate the cost of materials

Evaluate the cost of materials

  The marie simulator

Depending on how comfortable you are with using the MARIE simulator after reading

  What is the main advantage of using master pages

What is the main advantage of using master pages. Explain the purpose and advantage of using styles.

  Describe the three fundamental models of distributed systems

Explain the two approaches to packet delivery by the network layer in Distributed Systems. Describe the three fundamental models of Distributed Systems

  Distinguish between caching and buffering

Distinguish between caching and buffering The failure model defines the ways in which failure may occur in order to provide an understanding of the effects of failure. Give one type of failure with a brief description of the failure

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd