Remote access and cryptographic protocols

Assignment Help Basic Computer Science
Reference no: EM131018449

Application: Remote Access and Cryptographic Protocols

Remote access is essential to many organizations; however, it exposes the organization's information systems network to a variety of security threats. There are different countermeasures available to combat such threats and each organization must select the measures that serve it best.

Consider the following scenario: You are a busy software developer for a big IT consultancy and are working on a large IT project. You have not taken any vacation in two years and really need to get away for at least a week. However, given the nature of your job and the deadlines, you need to work for at least a couple of hours on most days of your vacation. As a result, you need remote access to your company's network. 

For this Assignment, prepare a presentation of 16-20 slides considering various modes of remote access, explaining them in terms of risks and benefits, and developing countermeasures to remote access based security threats. Address the following concerns in your presentation:

  • Suppose you use a virtual session (i.e. Citrix or VMware virtual desktop environments) for remote access. This access gives you a desktop session on the organization's intranet.
    • Explain specific details about this solution including which secure protocol it uses.
    • Explain the benefits and drawbacks of the virtual session.
  • Suppose you use a VPN for remote access. This access allows your computer to connect to the organization's intranet directly, like being at the office.
    • Explain specific details about this solution including which secure protocol it uses.
    • Explain the benefits and drawbacks of the VPN.
  • Select two defense countermeasures that would secure your company's network from threats associated with remote access. Justify your selection. Use APA format for your references.

Reference no: EM131018449

Questions Cloud

Does the claim made by r. edward freeman that managers have : Does the claim made by R. Edward Freeman that managers have an obligation to take into consideration the rights and interests of all legitimate stakeholders, above and beyond the law, seem plausible to you? Why, or why not? Explain.
Void increment : If I were to declare a function as follows:     void increment(int* pX); This function WILL be able to alter the value of the integer that was used as the argument.
The current source file or in any source file : a. Determines whether an identifier is known only in the current source file or in any source file with proper declarations.b. Determines the period during which that identifier exists in memoryc. Determines where the identifier can be referenced in ..
Calculate the price elasticity of demand : Calculate the price elasticity of demand when price equals $7500. Should Koko raise or lower the price of ATGM to gain more revenue if the current price is $7500? Why
Remote access and cryptographic protocols : Remote access is essential to many organizations; however, it exposes the organization's information systems network to a variety of security threats. There are different countermeasures available to combat such threats and each organization must sel..
Do you identify with any of the characters or situations : Do you identify with any of the characters or situations? If so, does this sense of identification help or interfere with your response? How so?
Provide user data to a country like china : Should a company such as Yahoo! Provide user data to a country like China, even if it is likely to lead to serious consequences for the user? Why or why not? Support your statements. Citations for all material used should be in APA format.
Why should a firm care about quality : Given the commoditized nature of many markets today, doescustomer relationship management and associated focus on quality, value and satisfaction - make sense?
Identify the date on which the speech was delivered : briefly analyze the speech itself, indicating which form of persuasion--logos, ethos, or pathos--was most dominant. Provide an example to support your assessment.

Reviews

Write a Review

Basic Computer Science Questions & Answers

  What is the relationship between transistor densities

In two paragraphs explain what is the relationship between transistor densities and the improvement in computer speed and miniaturization?

  What are the values of the flip-flop output

The table given above shows some parameters for the a 7474 Edge Triggered D Flip-Flop. What would be the maximum operating frequency this type of flip-flop?

  What is the proper syntax of declaring a c-style string

Take a look at the following program -- #include using namespace std; int main( ) { char name[100]; //declare a character array cout > name; cout

  Where is good website or to find info to complete solution

At the next family gathering, your uncle asked you if you knew of any solutions for this problem. Since you are in college and taking a computer course, you know that this problem could easily be solved with the use of a computer

  Create query in design view to return records from table

Create a query in Design view to return records from the Items table where the value of the Category field is Software and the value of the Cost field is greater than or equal to 199

  What would programs have to do for each type of hardware

If an applications' requests for data did not go through the OS, what would programs have to do for each type of hardware?

  Prepare gui to create object-s processing methods

Create the object-oriented design for system which maintains tracks of your CD and DVD collection. Prepare GUI which will create objects and give access to each object's processing methods.

  What are control and what are containers

What are the various component use to build Graphic User Interface(GUI) screen? What are control and what are containers

  Imagine a new file system structure

Imagine a new file system structure, describe it (and how it would work), give examples of its advantages and disadvantages.

  Design program asks user enter the number packages purchased

Design a program that asks the user to enter the number of packages purchased.

  Discuss the impact of the roles on health care organization

Discuss the impact of the roles on the health care organizations. Create a diagram with the career choice as the focal point and identifying the work roles within one of the services or product you identify.

  Set of experience knowledge structure

Set of Experience Knowledge Structure (SOEKS) is knowledge representation in an artificial system that would support discovering, adding, storing and sharing knowledge through experience in a similar way that humans DNA do. SOEKS is then later car..

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd