Remote access can be clearly defined as one’s ability to gain computer or network access from a remote location. Today many business people who travel often need to have remote access to their corporation's network. There is however vulnerabilities that all types of remote access have common, and it doesn’t matter what method used, the endpoint machine is vulnerable like all other systems that have access to the Internet. Whenever a system is accessible via the internet, that system is exposed to danger.
Analyze the Quick Finance Company Network Diagram and describe the assumptions you will need to make in order to identify vulnerabilities and recommend mitigation techniques as there is no further information from this company.
There are elements that are road maps that lead to system vulnerabilities: All systems contain some kind of a flaw, the flawed systems are accessible via the internet, and hackers have knowledge of system flaws and somehow gain access to the system. The network diagram of the Quick Finance Company’s shows that some of vulnerabilities I stated prior may exist in their network. I can therefore make an assumption that there are system vulnerabilities based on the fact the company’s web server was defaced twice in one month, they have experienced Denial-of-Service (DOS) attacks, and their VPN server has been previously hijacked. I can also make assumptions that they have weak administrative controls and/or security procedures. There needs to be a plan put in place to address the administrative controls and/or security procedures, to either create, replace or improve on the current controls and procedures.
I can also make an assumption that there are some hardware and software vulnerabilities, th...
... middle of paper ...
...kely to occur in any network: Ranked #1 would be some sort of a socially engineered Trojan, ranked #2 would be a man-in-the-middle attack, and ranked #3 would be a denial of service attack. There is however vulnerabilities that all types of remote access have common, and it doesn’t matter what method used, the endpoint machine is vulnerable like all other systems that have access to the Internet.
Farrow, R. (n.d.), Network defense, Retrieved from on February 28, 2014
Grimes, R. (2012.), The 5 cyber-attacks you're most likely to face, Retrieved on February 28,
2014 from http://www.infoworld.com/d/security/the-5-cyber-attacks-youre-most-likely-face-208361
Tosch Production. (2012), Mitm 8: Countermeasures, Retrieved from February 28, 2014
Need Writing Help?
Get feedback on grammar, clarity, concision and logic instantly.Check your paper »
- Poison Ivy and the “Nitro” Attacks Poison Ivy is the name given to a family of malicious remote administration Trojans first developed in 2005 and still being utilized for cyber attacks today. As a type of remote administration software, once a computer becomes infected the attacker has complete control of the computer. The most recently documented large-scale utilization of the software was during the “Nitro” attacks from July 2011 through September 2011 that targeted both chemical and defense companies for the purpose of industrial espionage (Fisher).... [tags: Computing]
1338 words (3.8 pages)
- With the rapid development of mobile devices, people can easily use various electronic services any time everywhere for convenient and modern life. Remote user authentication becomes a very important ingredient procedure for the network system service to verify whether a remote user is legal through any insecure channel. Users can use to access many applications, for example internet banking, online shopping, mobile pay TV, are accomplished on internet or wireless networks. Therefore, secure communications in such wireless environments are more and more important because they protect transactions between users and servers.... [tags: cryptographic, wireless, security]
3219 words (9.2 pages)
- Overview What does Brutus do. In simple terms, Brutus is an online or remote password cracker. More specifically it is a remote interactive authentication agent. Brutus is used to recover valid access tokens (usually a username and password) for a given target system. Examples of a supported target system might be an FTP server, a password protected web page, a router console a POP3 server etc. It is used primarily in two contexts : To obtain the valid access tokens for a particular user on a particular target.... [tags: Julius Caesar Essays]
2332 words (6.7 pages)
- Recently Advanced Research corporation has had much success in the medical research and development field. To keep the company’s success growing the company needs to ensure the information that is gained by doing research is not stolen. As the company becomes more successful it may also become a bigger target for attackers to try slow down productivity or steal data. One important thing Advanced Research corporation must do is ensure the company’s network remains active as well as secure. Down time on the network means loss of productivity of its employees since they won’t be able to access network resources when needed.... [tags: Operating system, Microsoft Windows, Security]
1202 words (3.4 pages)
- Starting from left to right on the diagram, I will discuss the security policies related to the Data Center/Server Farm/Network Security and assuring information confidentiality, integrity and authorized accessibility, followed by the mechanisms necessary to implement the aforementioned policies. Secure remote access must be implemented; no remote access for administrators. Authorized Users shall protect their login and password, even from family members. It is the responsibility of employees with VPN privileges to ensure that unauthorized users are not allowed access to our internal networks.... [tags: Security, Computer security, Access control]
1061 words (3 pages)
- Remote Electronic Voting: A Simple, Safe, and Accurate Voting System Does it not seem obvious that the United States should be voting over the Internet by now. Considering all the vitally important monetary and information-related transactions that occur over the Internet every day, one would think this could and would have happened already. However, Remote Electronic Voting, especially on a national scale, presents us with some possibly troubling implications and problems. These implications and problems, especially those concerning security, have prevented the U.S.... [tags: Politics Political]
1340 words (3.8 pages)
- Tracing the Source of Denial of Service Attacks Abstract: Denial of service attacks are becoming increasingly prevalent and serious, yet the anonymity that these attacks affords the hacker provides no means for a victim to trace the attack. The weakness of the TCP/IP protocol allows for this anonymity, yet it would be very difficult to change this protocol. Savage, Wetherall, Karlin, and Anderson present a method for tracing back the source IP address and network path of denial of service attacks.... [tags: Exploratory Essays Research Papers]
2010 words (5.7 pages)
- Network Plan for ZXY Corporation Implementing a new network, on an enterprise level, requires thinking of network security along with data throughput. The installation of the ZXY Corporation’s network, while allowing employees to have network functionality to do their job related duties, leaves the enterprise network open for network attacks. These possible attack vectors have a wide range of avenues to circumvent and corrupt or steal digital media. To stifle intrusion attempts, a multitude of countermeasures must be applied.... [tags: Authentication, Password, Access control]
1596 words (4.6 pages)
- Introduction According to Dubrawsky and Faircloth, remote access denotes to the ability to access a computer, for instance, an office network computer or home computer, from a remote location. This permits personnel to work offsite, for example at home, or any other location, while employees still have to a distant network or computer. Remote access can be implemented by use of wide area network (WAN), local area network (LAN) or virtual private network (VPN). Either of these implementations allows access of systems and resources (Dubrawsky & Faircloth, 2007).... [tags: Virtual private network, Computer network, Wi-Fi]
1010 words (2.9 pages)
- The nature of our business requires us to have a flexible sales force. Because of that detail we need to be receptive to the needs of our mobile workforce. The most critical tool involved in their success is the ability to reliably connect and access our company networks. These connections can be from employees using company issued laptops or personal computers used from home or on the road. For the most part we have addresses the needs of our sales force on a case by case basis but going forward we really need to ensure we have a defined policy to streamline remote access.... [tags: windows server, network access]
1136 words (3.2 pages)