Micro Widgets, Incorporated is a dynamic organization constantly looking to expand its customer base. To do so, the company utilizes the skills of a mobile sales force. Being mobile, the sales force requires access to the corporate network from time to time while on the road. The Chief Information Officer (CIO) issued a mandate that all employees of the organization have remote access to the corporate network. This enables the sales force to do their job. It also affords the company the ability to offer the benefit of working from home to the employees of the organization. This document will outline the protocols, roles and services necessary to offer remote access to anyone working for the organization.
Before discussing any specific solutions to provide remote access to the employees, the concept of remote access needs a clear definition. “Remote access is the ability to get access to a computer or a network from a distance. A remote access server is the computer and associated software that is set up to handle users seeking access to the network remotely” (Rouse, 2005). Opening a server or firewall to allow access without taking specific measures to secure the corporate network opens the organization to the potential for theft, data loss or downtime. A properly deployed remote access solution includes security measures to prevent this from happening.
Virtual Private Network
A Virtual Private Network (VPN) is the mechanism a remote user uses to connect a remote access server. For a Micro Widgets, Incorporated employee, a VPN allows for a secure transmission of data between two points across the Internet. “Companies maintain VPNs so that employees can access files, applications, printers, a...
... middle of paper ...
... organization and its data.
Geier, E. (2013). How (and why) to set up a VPN today. Retrieved from
Microsoft. (2014). Network policy and access services. Retrieved from http://technet.microsoft.com/en-us/network/bb545879.aspx
Microsoft. (2014). Routing and remote access service. Retrieved from http://technet.microsoft.com/en-us/library/dd469790.aspx
Microsoft. (2009). VPN tunneling protocols. Retrieved from http://technet.microsoft.com/en-us/library/dd469817(v=ws.10).aspx
Perrin, C. (2008). Understanding layered security and defense in depth. Retrieved from http://www.techrepublic.com/blog/it-security/understanding-layered-security-and-defense-in-depth/#.
Rouse, M. (2005). Remote access. Retrieved from http://searchmidmarketsecurity.techtarget.com/definition/remote-access
Need Writing Help?
Get feedback on grammar, clarity, concision and logic instantly.Check your paper »
- Introduction According to Dubrawsky and Faircloth, remote access denotes to the ability to access a computer, for instance, an office network computer or home computer, from a remote location. This permits personnel to work offsite, for example at home, or any other location, while employees still have to a distant network or computer. Remote access can be implemented by use of wide area network (WAN), local area network (LAN) or virtual private network (VPN). Either of these implementations allows access of systems and resources (Dubrawsky & Faircloth, 2007).... [tags: Virtual private network, Computer network, Wi-Fi]
1010 words (2.9 pages)
- Remote Access Solutions Remote access Remote access is defined as the ability of a user to log onto a network from a distant location. This is accomplished with a remote computer connected to the distant network. Whereas remote control refers to taking control of another computer, remote access means that the remote computer becomes a work station on the network. Communication between the network facility equipment and the remote computer is accomplished through a data link. The only difference between a remote user and workstations connected directly to the network is slower data transfer speeds.... [tags: Networks Telecommunications]
1444 words (4.1 pages)
- An Introduction Until recently, reliable communication has meant the use of leased lines to maintain a Wide Area Network (WAN). Leased lines, ranging from Integrated Services Digital Network (ISDN, which runs at 144 Kbps) to Optical Carrier-3 (OC3, which runs at 155 Mbps) fiber, provide a company with a way to expand their private network beyond their immediate geographic area. A WAN has obvious advantages over a public network like the Internet when it comes to reliability, performance, and security, but maintaining a WAN, particularly when using leased lines, can become quite expensive (it often rises in cost as the distance between the offices increases).... [tags: Computer Network Technology]
1443 words (4.1 pages)
- VPN stands for Virtual Private Network. VPN is the term used to refer to any device that is capable of creating a semi-permanent encrypted tunnel over the public network between two private machines or networks to pass non-protocol specific, or arbitrary, traffic. This tunnel can carry all forms of traffic between these two machines meaning it is encrypting on a link basis, not on a per application basis. VPNs are useful in situations where an entity is paying for dedicated leased lines due to security concerns or the need to provide layer two communications over a WAN link via transparent bridging, WINS servers, or other broadcast repeaters (Snyder, 2004).... [tags: Network Technology]
1475 words (4.2 pages)
- VPN Introduction: VPN stands for Virtual Private Network. VPN is a data network connection that makes use of the public telecommunication infrastructure but maintains privacy through the use of a tunneling protocol and security procedures. It operates much like a Wide Area Network (WAN). Most companies actually leased lines, but in either case both solutions are very expensive. As the Internet became more widely available people started creating VPN solutions that took advantage of the cheap network access.... [tags: Computer Networking]
1159 words (3.3 pages)
- 1. The most common types of system access controls Access control determines allowed activities of legitimate users, mediating every attempt by a user to access a resource in the system and prevent unauthorized users to access the system. It requires unique user identification, emergency access procedure, automatic log-off, and encryption and decryption of data. Some common types of access control include: User-based, Role-based and Context-based access control with the strongest security on Context-based access control.... [tags: Information Technology]
1004 words (2.9 pages)
- This paper will Describe in detail what Virtual Private Networking is and how it is used in companies. It will cover all of the benefits, as well as the problems encountered in achieving success with this facilitator of social software. It will give examples of companies and how they use the technology, it will provide case studies of companies that have used the technology successfully. It will review the author’s thoughts of how to use VPN in a common workplace. Then it will show you how to implement VPN on a network, through both hardware and software installations.... [tags: VPN]
1869 words (5.3 pages)
- Virtual Private Networks Virtual Private Networks (VPNs) are an easy and cost effective way to connect two or more networks over the Internet. This is achieved by using encrypted tunnels for security and efficiency. VPNs use encapsulated and encrypted IP packets and transport them across leased Local Area Network (LAN) lines. The benefits of using VPNs are reduced cost overhead, reduced management overhead, and added security (Microsoft Press, 2000). Least network lines are expensive and VPNs reduce then need for extra data connections.... [tags: VPN Internetworking Computers Internet Essays]
924 words (2.6 pages)
- Remote Network Administration for the Home and Small Office User Remote network administration is a fast growing and widely used technology in the IT field today. It gives system and network administrators as well as home users the ability to fix problems, allow or deny access to websites, download information directly from another computer, and give program permissions for different users from the office that they are at or from anywhere in the world that has an internet connection. With this very powerful technology, come some very significant problems such as securing remote access sessions via data encryption, the use of Virtual Private Networks (VPN’s) and a vast amount of networking a... [tags: Design and Technology]
1162 words (3.3 pages)
- We are pleased for the opportunity to respond to your request for assistance with your remote access strategy. Allowing your employees to work from home is the smart thing to do for your business. Recent, Stanford University studies have shown productivity gains ranging from 13% to 22% when companies shift to work from home business models (Bloom, Liang, Roberts & Ying, 2013). Beyond pure productivity, working from home was show to decrease employee turnover and increase overall employee happiness.... [tags: Remote access, VPN, dial-up networking]
922 words (2.6 pages)