ALL >> Education >> View Article
Remote Access Plan And Implementation Of The Solution
The network design for the remote users will leverage the virtual private network shown above. A virtual private network allows a desktop computer (s) at outside the corporate network to connect to the corporate network at the office and enables the remote devices to access the office’s network resources. They thus function as the other PCs physically in the office physically which are directly connected to the network (Chowdhury & Boutaba, 2009). I chose the VPN remote access network over remote access networks such as dial-in remote access and wireless remote access because it provides secure and advanced connections via a non-secure network. It uses encryption to establish the VPN tunnel between the clients in the remote places and the corporate network. There are several basic security measures that Suns technologies will need to employ to ensure that the remote network access is secure.
One of the remote access security enhancements for this network is to secure the remote access servers physically. A strong virus protection solution will also need to be applied and maintained to protect the remote access users and the network resources from viruses and malware. The NTFS file system will also be used to protect the data on the system. The remote access servers will be protected from unauthorized access using strong passwords that will also be changed from time to time. As shown above, the traffic between the remote access server and the remote users will be protected using the tunneling method. In this case, all the data being transferred between the two endpoints is fragmented into frames (Simion et al., 2012). The frames passing through the tunnel are then encrypted with additional tunneling layer of encryption and encapsulation that is also utilized to route packets to the right direction.
The security of the remote access users will further entail the use of IPSec filters to protect confidential IP traffic. IPSec (or IP Security) secure data by signing and encrypting it before it is transmitted over a public network (Simion et al., 2012). The company should also consider the use of smart cards to enhance their security access strategy further. Users will be protected further by the monitoring of the activity of the remote access server to ensure that any suspicious activities are noticed in time and promptly addressed before they can escalate and cause harm to the network and its resources. It will also be prudent to create and configure remote access policies. These remote access policies are useful in restricting remote connections after they have been authorized.
Access will also be controlled via the Dial-in Properties of individual users’ accounts that the remote access users use to connect to the corporate network. Another useful technique that will be used in this network to provide more security to the clients is the Remote Authentication Dial-In User Service (RADIUS), which provides authentication, authorization, as well as accounting for the company’s remote access infrastructure (Nelson, 2011). I will also propose the use of Microsoft Encrypted Authentication Version 2 (MS-CHAPv2) to provide mutual authentication for the network as well as the dial-up authentication using encrypted passwords. This method is one of the most secure authentication techniques to use in controlling remote access connections to the remote access servers.
Case 3.2: Implementing your Remote Access Solution
The purpose of the remote access policy is to define the rules as well as the requirements for connecting to Suns technologies’ network from the host. The rules and requirements are aimed at minimizing the potential exposure to Suns Technologies from damages that may emanate from unauthorized use of the company resources. The policy applies to all Suns technologies’ employees, contractors, vendors, and agents having Suns Technologies’ owned or personally-owned computers or workstations with which they access the company network. Below are the updated requirements for remote access policies.
• Secure remote should be strictly controlled with encryption and strong passphrases.
• Authorized users will have to protect their login and passwords even from their very close friends and relatives.
• When using Suns technologies’ owned computer or device to connect to the corporate network remotely, Authorized Users will have to ensure that the remote host is not connected to another network(s) simultaneously except the personal networks under their complete control.
• The use of external resources to carry out Suns Technologies’ business should be approved in advance by the appropriate business unit manager or InfoSec.
3.2.3. Policy Compliance
The Suns Technologies’ InfoSec team is responsible for verifying compliance to the remote access policy via various techniques such as periodic walk-throughs, internal and external auditing, inspection, video monitoring, and business tool reports.
Any exception to the policy ought to be approved by the Remote Access Services as well as the Infosec Team in advance.
Any Suns technologies’ staff found to have violated this policy is subject to disciplinary action that can even include termination of employment.
Date of Change Responsible Summary of Change
February 2017 Suns Technologies Policy Team Converted to a new format
September 2017 Hamilton McGregor Strengthened the policy by limiting the use of company resources to authorized users only; made several changes to include the security of the remote access server.
Chowdhury, N. M. K., & Boutaba, R. (2009). Network virtualization: state of the art and research challenges. IEEE Communications magazine, 47(7).
Nelson, D. (2011). Crypto-Agility Requirements for Remote Authentication Dial-In User Service (RADIUS) (No. RFC 6421).
Simion, D., Ursuleanu, M. F., Graur, A., Potorac, A. D., & Lavric, A. (2012). Efficiency Consideration for Data Packets Encryption within Wireless VPN Tunneling for Video Streaming. International Journal of Computers Communications & Control, 8(1), 136-145.
Sherry Roberts is the author of this paper. A senior editor at Melda Research in Custom Paper Writing Service. If you need a similar paper you can place your order for a custom research paper from Write My Paper For Me services.
Education Articles1. Data Scientist Or Information Science Group? That's The Query!
2. Quality Education At Global Group Of Institutes
Author: Global INSTITUTE
3. Best Institute For Aiims Preparation - Ideal Institute Of Biology
Author: Ideal Institute of Biology
4. Top Play School In Gurgaon
Author: swiss cottage
5. Top Reasons For Unemployment Among The Engineering Graduates
Author: jams jhons
6. Valuable Skills You Will Gain With A Pgdm Degree
7. What Is Blockchain Technology, And How Can It Be Used In The Education Sector?
Author: Block chain council
8. 2d And 3d Animation Course Certification And Information
Author: Mac Hardy
9. 7 Major Principles Of Animation For Beginners
Author: Mac Hardy
10. 10 Reasons Why Maac Institute Is Best In Animation Courses In Pune
Author: Mac Hardy
11. Top 5 Most Popular 3d Animation Movies In The World
Author: Mac Hardy
12. Why Vfx Animation Is A Good Course For Career Prospective?
Author: Mac Hardy
13. 5 Things To Think About When Choosing An Acting Institute
14. Reasons You Should Sign Up For A Master Of Law (llm) Right Away
Author: Komal Patil
15. Features Of A Learning Management System
Author: Tanisha Dutta