Remote access and cryptographic protocols

Assignment Help Basic Computer Science
Reference no: EM131018449

Application: Remote Access and Cryptographic Protocols

Remote access is essential to many organizations; however, it exposes the organization's information systems network to a variety of security threats. There are different countermeasures available to combat such threats and each organization must select the measures that serve it best.

Consider the following scenario: You are a busy software developer for a big IT consultancy and are working on a large IT project. You have not taken any vacation in two years and really need to get away for at least a week. However, given the nature of your job and the deadlines, you need to work for at least a couple of hours on most days of your vacation. As a result, you need remote access to your company's network. 

For this Assignment, prepare a presentation of 16-20 slides considering various modes of remote access, explaining them in terms of risks and benefits, and developing countermeasures to remote access based security threats. Address the following concerns in your presentation:

  • Suppose you use a virtual session (i.e. Citrix or VMware virtual desktop environments) for remote access. This access gives you a desktop session on the organization's intranet.
    • Explain specific details about this solution including which secure protocol it uses.
    • Explain the benefits and drawbacks of the virtual session.
  • Suppose you use a VPN for remote access. This access allows your computer to connect to the organization's intranet directly, like being at the office.
    • Explain specific details about this solution including which secure protocol it uses.
    • Explain the benefits and drawbacks of the VPN.
  • Select two defense countermeasures that would secure your company's network from threats associated with remote access. Justify your selection. Use APA format for your references.

Reference no: EM131018449

Questions Cloud

Does the claim made by r. edward freeman that managers have : Does the claim made by R. Edward Freeman that managers have an obligation to take into consideration the rights and interests of all legitimate stakeholders, above and beyond the law, seem plausible to you? Why, or why not? Explain.
Void increment : If I were to declare a function as follows:     void increment(int* pX); This function WILL be able to alter the value of the integer that was used as the argument.
The current source file or in any source file : a. Determines whether an identifier is known only in the current source file or in any source file with proper declarations.b. Determines the period during which that identifier exists in memoryc. Determines where the identifier can be referenced in ..
Calculate the price elasticity of demand : Calculate the price elasticity of demand when price equals $7500. Should Koko raise or lower the price of ATGM to gain more revenue if the current price is $7500? Why
Remote access and cryptographic protocols : Remote access is essential to many organizations; however, it exposes the organization's information systems network to a variety of security threats. There are different countermeasures available to combat such threats and each organization must sel..
Do you identify with any of the characters or situations : Do you identify with any of the characters or situations? If so, does this sense of identification help or interfere with your response? How so?
Provide user data to a country like china : Should a company such as Yahoo! Provide user data to a country like China, even if it is likely to lead to serious consequences for the user? Why or why not? Support your statements. Citations for all material used should be in APA format.
Why should a firm care about quality : Given the commoditized nature of many markets today, doescustomer relationship management and associated focus on quality, value and satisfaction - make sense?
Identify the date on which the speech was delivered : briefly analyze the speech itself, indicating which form of persuasion--logos, ethos, or pathos--was most dominant. Provide an example to support your assessment.

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Business requirements drove the system''s initial development

Discuss how the business requirements drove the system's initial development.

  Discuss whether design considerations need to change

Are there certain projects in which the traditional approach would work better? If not, explain why not. If so, give at least one example of such a project.

  Role in defining healthcare documentation

Go to Accreditation Association for Ambulatory Health Care (AAAHC) http;//www.aaahc.org/ and In a brief summary, outline what type of organization it accredits or reviews and its role in defining healthcare documentation.

  What in the history of programming languages

What, in the history of programming languages, motivated the development of Java? Answer it more than 250 words.

  How does policy impact the discussion to disclose a breach

What does the current law say about companies having to release information / statements on a security breach?

  Write down the body of method for header

Write down the body of method for the following header. Method must return the welcome message which includes the user's name and visitor number.

  Decision to utilize components influence requirements

Must RMO consider using purchased components in the new CSS? If so, When, must it begin looking for components? How will decision to utilize components influence requirements, design and implementation phases?

  Explain utilitarian theory tells us about the morality

What do you believe utilitarian theory tells us about morality of such questions as abortion, capital punishment, or euthenasia? Is utilitarian theory helpful in deciding these questions?

  Apply yen''s algorithm to find the shortest path from node 1

Apply Yen's alogithm to find the shortest paqth from node 1 to all

  How a company developed a template for a web page

Marion has argued that with modern information technologies, collocation of team members is no longer important. How would you respond to this claim?

  Consider the procedure described in adaptive playout delay

Consider the procedure described in "Adaptive Playout Delay" for estimating average delay di. Let r1 - t1 be the most recent sample delay, let r2 - t2 be the next most recent sample delay.

  Describe at least one possible effect that multithreading

1Describe at least one (1) possible effect that multithreading could have on event-driven programming when you are either developing or using a computer program. Support your response with at least (1) example of the effect of multithreading.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd