Free Essay

Remote Network Access Technology

In:

Submitted By ToniPeretta
Words 1041
Pages 5
WHAT IS REMOTE NETWORK ACCESS TECHNOLOGY? or REMOTE ACCESS SERVICE ( RAS )
Remote network access technology allows access to a computer or a network from a remote distance. Employees at branch or satellite offices or telecommuters, and travelling staff members may need access to the company or agency’s network and are able to do so via remote access. Users working from home get access through an Internet service provider (ISP) or Dial-up connection through desktop, notebook, or handheld computer modem over regular telephone lines.
These days almost every company offers some type of remote access to accommodate employees working outside the office and others like business partners, vendors, or external technical support. Remote Access Service (RAS) allows remote clients to dial-in and connect to network as if they were locally connected in the office.
VPN REMOTE ACCESS TECHNOLOGY
VPN (Virtual Private Network) & Tunneling A Virtual Private Network (VPN) is a private connection over a public network such as the Internet. VPNs can save a company a lot of money because it use Internet connection rather than expensive long-distance point-to-point connections such as dial-up, ISDN, and leased lines, to allow remote networks and remote employees to connect to the corporate network.
A site-to-site or LAN-to-LAN VPN as shown below is typically used for connecting branch offices of a single organization or for creating an extranet for business partners. The second main type of VPN is called remote access VPN and is mostly used for remote and mobile users who need to access the corporate network regardless of their location be it at home, at a hotel, on a business trip, or at a business partner’s office. Internet connection is required and VPN client software is installed on the client’s operating system which establishes a tunnel to the corporate network after a connection with a local ISP is established. http://www.techexams.net/technotes/securityplus/ras.shtml

BENEFITS OF REMOTE ACCESS TO EMPLOYERS AND EMPLOYEES
Increase in Productivity
Enabling employees to access the company's network from home means they can work in the evenings instead of staying late at the office to access files and programs on the company's network. Employees can have constant, up-to-date access to details of their company's inventory, products and services making a business more responsive to its customers thereby generating more sales.
Convenience and Security
RAS allows employees to access their computer from anywhere in the globe. They are able to leave their computers at home without worrying about needing to carry data physically on it. If there is a need to access data on the computer, a RAS connection can be used to retrieve the information without compromising security.
Cost Savings for Employers
Remote workers save employers costs on travel, office space, maintenance and parking space requirements.
Cost Savings for Employee
When working from home there is no need for professional clothing, thereby saving lots of money yearly. Same also applies to gas or public transportation, parking, lunches out, dry cleaning, and child care. It is also a tax benefit to have a home office. http://www.computerweekly.com/feature/Can-business-benefit-from-remote-access http://www.flexjobs.com/blog/post/telecommuting-advantages-and-some-disadvantages-for-good-measure/

DRAWBACKS OF REMOTE ACCESS
Security Risks
Without implementing proper procedures, policies and practices, remote accessing a company’s network can pose serious security risks. Common practices should include periodically changing passwords and educating employees about the importance of remote access security. A company’s network is also at risk if an employee’s computer gets affected with a virus or stolen.
Reliability
Remote access networks are open, running networks run over the Internet and therefore not as reliable and efficient as closed networks that run over wires. If the Internet service is performing poorly, it compromises the remote access connection therefore the reliability of the RAS is highly dependent on the internet service. Wi-Fi servers are often slower than wired servers.
Speed
Speed of the service is also dependent on the number of people accessing the network at the same time via RAS. Uploads, downloads and transfers all take longer to complete with higher traffic.

http://www.computerweekly.com/feature/Can-business-benefit-from-remote-access http://www.flexjobs.com/blog/post/telecommuting-advantages-and-some-disadvantages-for-good-measure/ http://www.referenceforbusiness.com/small/Sm-Z/Telecommuting.html#ixzz3Y9dpR3y8 http://www.ehow.com/list_7569718_remote-access-disadvantages.html REMOTE ACCESS TECHNOLOGY SOLUTION PROVIDERS
Hardware - Perle, Extreme Networks, Nortel, Cisco
Software – Avia/ Lucent, VPNet
Firewalls, Routers or Encryption programs - Checkpoint, Netscreen , Watchguard. http://www.ehow.com/list_5779073_advantages-remote-access-vpn.html

WHAT IS PORTABLE EXTERNAL STORAGE TECHNOLOGY?
External storage comprises of portable devices that temporarily stores, backs up, and transports data and information such as personal files, documents, pictures, videos, music etc. from one computer to another. Some people use it to store information that is not needed frequently in preparation for emergencies.
COMMON TYPES OF EXTERNAL STORAGE DEVICES
USB flash drive (or thumb/jump drive) is a data storage device that includes flash memory with an integrated flash Universal Serial Bus (USB) interface. They are removable and rewritable, and physically small, some weighing less than 30 grams (1.1 oz.) They have speed and high capacity and are very flexible because they have no moving parts also making them durable and reliable. Up to one terabyte of storage space is now available on these types of devices and they can last as long as 10-years.
Memory card (or memory stick) is an integrated circuit for storage and transfer of digital data in most electronic devices. It can store data in a variety of forms such as texts, graphics, digital images etc. Memory cards are available in various storage sizes ranging from 4 to 64 Megabytes
External hard drives are usually used in addition with the computer’s internal hard drive in order to store and transport data. An external hard drive is external to the main computer tower but can be connected to the computer via an interface cable, which allows it to communicate with the computer and pass data back and forth. http://en.wikipedia.org/wiki/External_storage http://www.wisegeek.com/what-is-an-external-hard-drive.htm

Similar Documents

Premium Essay

Project: Access Control Proposal

...Project: Access Control Proposal * Phase I: Risk mitigation plan to identify critical IT assets * Phase II: Policies and procedures for protecting the IT assets Contents I. Introduction 2 II. Diagram of the proposed solution 3 III. Phase I:Access Control Risk Mitigation 3 1. Identified Treats and vulnerabilities 3 2. IT assets 4 3. Treats and vulnerabilities per IT Domain 4 4. The System Security Team 5 5. Access Control Plan 5 IV. Phase II: Policies and procedures for protecting the IT assets 6 1) General Security Practices for VPN Remote Access 6 2. Protecting Cyber Assets: Secure Interactive Remote Access Concepts 7 2. How Employee Accesses the Corporate Network 9 3. How external Partners (Vendor) Access the Corporate Network 9 V. Conclusion 13 I. Introduction Access control mechanisms operate at a number of levels in a system, from applications down through the operating system to the hardware. Higher-level mechanisms can be more expressive, but also tend to be more vulnerable to attack, for a variety of reasons ranging from intrinsic complexity to implementer skill levels. Most attacks involve the opportunistic exploitation of bugs; and software that is very large, very widely used, or both (as with operating systems) is particularly likely to have security bugs found and publicized. Operating systems are also vulnerable to environmental changes that undermine the assumptions used in their design. The main function of access control...

Words: 2458 - Pages: 10

Premium Essay

Technology Solution to a Business Problem

...Technology Solution to a Business Problem Subject of Course Project Advanced technology is proved to be beneficial for organizations and business more than ever before, it helped in bringing business close. It assisted in each and every aspect of business from making team of best employees, to booking order, delivery of products and their support. We need to use advanced technology in order to help business needs of an organization or use specific technology to solve a business related issue for an organization. Business problem statement Our target company is facing an issue related to its financial conditions, company is determine to use technology in order to stable its financials. This company need a single software using cloud computing for its employees to work from home and for communication purposes. Company want to provide a healthy environment for working and allowing its employees to use advance technology which is efficient and could help employees to communicate each other, no one outside of company should be able to view their communications or company data. Name of the company or organization Temenos is a multinational banking software systems (T24) Provider Company, it has its clients in 125 countries around the world and employees in more than 50 countries. It is one of the leading organization specialized in the field of banking software solution and support. General benefits it will provide the organization We need to develop a cloud technology...

Words: 3690 - Pages: 15

Premium Essay

Remote Access Control Policy

...Remote Access Control Policy Definition What is remote access? Remote access is the ability to log onto a network from a distant location. What that means that a computer, a modem, and some kind of remote access software is required to connect to the network. But remote control refers to actually taking control of another computer, whereas remote access means that the remote computer has the ability to become a hot on the network. When you use remote access software it will directly dial into the network server. There is a difference between a remote host and workstations that are connected directly to the network is the slower data transfer speeds. What the purpose behind a remote access policy is to define the standard hosts on the company’s intranet from the remote host, non-trusted hosts (on the company’s intranet too), and remote network. These standards are setup to minimize any potential exposure to the company’s network and data from any damages, which are a result of unauthorized access by attackers through the network, virus, software, and more. When it comes to the main location of the company, it will have a Wide Area Network (WAN), along with the WAN there will be a set of switches and routers connected to and from the WAN. This allows for the switches to be connected to different topologies. A Virtual Private Network (VPN) will be created using Internet Protocol (IP) by the company’s IT department. Within the VPN there will be other VPN routers will communicate...

Words: 889 - Pages: 4

Premium Essay

Whatever Works

... Unit 3 Assignment 1 Richmond Corporate Remote Access Policy 1.0 Purpose The purpose of this policy is to define standards for connecting to the Richmond corporate network from any remote host. These standards are designed to minimize the potential exposure to the Corporation from damages which may result from unauthorized use of corporation resources. Damages include the loss of sensitive or confidential data, intellectual property, damage to public image, damage to critical internal systems, etc. 2.0 Scope This policy applies to all Corporation employees, personnel, and affiliates including vendors and agents with a corporation owned or personally-owned computer or workstation used to connect to the Richmond network. This policy applies to remote access connections used to do work on behalf of Richmond or for personal business, including reading or sending email and viewing intranet web resources. Remote access implementations that are covered by this policy include, but are not limited to, dial-up modems, DSL, and cable modems, etc. 3.0 Policy 3.1 General 1. It is the responsibility of Richmond employees, personnel, or affiliates with remote access privileges to the corporation network to ensure that their remote access connection is given the same consideration as the user's on-site connection. 2. Please review the various computing policies located on http://security...

Words: 956 - Pages: 4

Premium Essay

Remote Access Control Policy Definition

...Remote Access Control Policy Definition Introduction to Information Security Remote access is the ability to log onto a network from a distant location. Generally, this implies a computer, a modem, and some remote access software to connect to the network. Whereas remote control refers to taking control of another computer, remote access means that the remote computer actually becomes a full-fledged host on the network. The remote access software dials in directly to the network server. The only difference between a remote host and workstations connected directly to the network is slower data transfer speeds. The purpose of a remote access policy is to define the standard connection to the company’s network from any remote host, untrusted host and remote network, including untrusted hosts on the company’s intranet. These standards are designed to minimize the potential exposure to the company’s from damages, which may result from unauthorized use of the company’s resources. At the main location, a set switches and routers are interconnected to from a Wide Area Network. The switches can be connected in different topologies. All remote users must follow the security requirements set forth in the standard for the company’s remote host accessing Information Technology Resources prior to such access, as well as any guidelines, procedures or other requirements issued by the Information Technology Department. Within the virtual private network multiple Virtual Private Network routers...

Words: 660 - Pages: 3

Premium Essay

Remote Access Policy Case Study

...facilities to older populations. Remote access is a vital part aspect of this organization. It runs services with the help of remote health assistants and nurses who visited the patients and at the end of the day need they need to connect back to our network. However, remote access applies from the unsecured network might create security vulnerabilities. To minimize the risk posed by these remote workers, XYZ Health Care came with the Remote Access Policy. 2. Purpose This remote access policy is established to maintain criteria for connecting to XYZ's network (or any network operated by XYZ) from any host /entity. These standards are created to mitigate probable threats and vulnerabilities posed...

Words: 697 - Pages: 3

Premium Essay

Virtual Private Network

...Virtual Private Network IS 311 Dr. Gray Tuesday 7pm November 19, 2002 By: Germaine Bacon Lizzi Beduya Jun Mitsuoka Betty Huang Juliet Polintan Table of Contents I. Introduction ……………………………………………….. 1 - 2 II. VPN Topology……………………………………………... 2 - 3 III. Types of VPNs……………………………………………... 3 - 5 IV. Components of VPNs………………………………………. 5 - 7 V. Productivity and Cost Benefit…………………………….... 7 - 9 VI. Quality of Service………………………………………….. 9 VII. The Future of VPN……………………………………….... 9 - 11 VIII. Conclusion…………………………………………………. 11 IX. Bibliography………………………………………………...12 - 13 X. Questions……………………………………………………14 Introduction Virtual. Virtual means not real or in a different state of being. In a VPN, private communication between two or more devices is achieved through a public network the Internet. Therefore, the communication is virtually but not physically there. Private. Private means to keep something a secret from the general public. Although those two devices are communicating with each other in a public environment, there is no third party who can interrupt this communication or receive any data that is exchanged between them. Network. A network consists of two or more devices that can freely and electronically communicate with each other via cables and wire. A VPN is a network. It can transmit information over long distances effectively and efficiently...

Words: 4870 - Pages: 20

Premium Essay

Nt2580

...were able to come up with the following information design in a form of questions and answers. What is required to implement a SAN and /or NAS?  Storage-area networks (SANs) are composed of computers and remote storage devices. The computers are typically connected to the remote storage devices using SCSI over Fibre Channel (see Figure 1). Other implementations of SAN exist, but this is the most common. In a SAN, all the storage appears local, just as if the remote disk were directly connected to the computer and physically located inside the computer chassis. Network-attached storage (NAS) devices appear to the user as a remote drive letter or are named remote storage device. Typically, the operating system employs a protocol such as Network File System (NFS) or Common Internet File System (CIFS) to discover, log in, and transfer content to and from a storage device. NFS and CIFS both communicate over Ethernet. The user typically enters a username and password, and then is granted access to a particular device. Figure 1. SAN and NAS use different protocols and transports. Click here to see an enlarged diagram. Read more:  http://broadcastengineering.com/mag/broadcasting_san_nas_practical/#ixzz1vw2GVkV9 The SAN and NAS storage schemes evolved to meet different needs. Some possible benefits of SAN include access to large amounts of data; sharing data among different applications on...

Words: 7132 - Pages: 29

Premium Essay

Virtual Private Network

...Virtual Private Network IS 311 Dr. Gray Tuesday 7pm November 19, 2002 By: Germaine Bacon Lizzi Beduya Jun Mitsuoka Betty Huang Juliet Polintan Table of Contents I. Introduction ……………………………………………….. 1 - 2 II. VPN Topology……………………………………………... 2 - 3 III. Types of VPNs……………………………………………... 3 - 5 IV. Components of VPNs………………………………………. 5 - 7 V. Productivity and Cost Benefit…………………………….... 7 - 9 VI. Quality of Service………………………………………….. 9 VII. The Future of VPN……………………………………….... 9 - 11 VIII. Conclusion…………………………………………………. 11 IX. Bibliography………………………………………………...12 - 13 X. Questions……………………………………………………14 Introduction Virtual. Virtual means not real or in a different state of being. In a VPN, private communication between two or more devices is achieved through a public network the Internet. Therefore, the communication is virtually but not physically there. Private. Private means to keep something a secret from the general public. Although those two devices are communicating with each other in a public environment, there is no third party who can interrupt this communication or receive any data that is exchanged between them. Network. A network consists of two or more devices that can freely and electronically communicate with each other via cables and wire. A VPN is a network. It can transmit information over long distances effectively and efficiently...

Words: 4870 - Pages: 20

Free Essay

Access Control Policy

...Overview Nelleo Networking and Technology main focuses is to prevent unauthorized access to all available resources, data computers and information systems on the network. Every employee and supporting staff that has a User name and password to the organizations network must follow this policy Purpose Malicious attacks from hackers are common on the network. Therefore it is up every employee and supporting staff to help protect the network and its resources, including data, from unauthorized access. Scope This policy was created to insure that the company stays in adherence to governmental laws that requires the organization to protect vital information that may be damaging to its employees and customers. Access Control • Allow employees and supporting staff will submit a request to the IT Department for access to the network. The requester will have his/her supervisor and manager sign off on the request listing all of the resources the employee will need access to. • Once the employee receives the approval for a user account, the employee will then come to the IT department where they will receive a CAC card for access to the network. • Upon logging in for the first time the employee will be require to change his/her password in accordance with the Password Policy. UserID Obligations • At no given time will you give your CAC card to another employee. This will be considered a violation and a dispensary action will be taken. • Your CAC card also acts...

Words: 451 - Pages: 2

Free Essay

Rlyt Task 2

...Annotated Bibliography Dial-up Internet Access Reynolds, D. (1993). Evaluating Dial-Up Internet access options. Computers In Libraries, 13(8), 86. Retrieved October 2014, from Ebscohost Online Library: http://eds.b.ebscohost.com/ehost/detail/detail?sid=a4049de6-8035-470b-bb50-77b0b3baaebd%40sessionmgr113&vid=0&hid=122&bdata=JnNpdGU9ZWhvc3QtbGl2ZSZzY29wZT1zaXRl#db=a9h&AN=9312014331 Dial-up internet access uses the regular telephone lines to connect customers to the internet. The remote locations will only need to a computer with a modem to “dial” out to an Internet Service Provider (ISP) using the phone lines currently available. The major advantage to dial-up internet access is that it is very simple to set up and is quite possible the cheapest way for an individual to get to the internet. A primary disadvantage to using dial-up internet access is that it is extremely slow with transfer speeds. The article provides some insight into how to determine the best dial up provider for an end user. It also describes some of the alternate costs associated with using dial up service, as well as some limited discussion of system performance and functionality considerations. I believe the article would be best used as general reference for NHS to determine the best dial-up provider to use at the various remote offices. The article also contains a section discussing regarding the speed of the dial-up in relationship to the connection time which is an important factor for users...

Words: 2655 - Pages: 11

Free Essay

Distance Learning Computer-Based Hands-on Workshop: Experiences on Virtual and Physical Lab Environments

...distance learning with ability to support hands-on computer lesson is needed. In this paper, a platform for region-wide distance learning computer-based hands-on workshop is presented through the actual developments. The proposed platform supports 1) teaching/learning activities in a hands-on computer workshop 2) efficient large-scale remote computer laboratory. Computer virtualization and StarBED large-scale computing testbed were utilized to create a distance learning computer laboratory, virtual and physical. This paper discusses various aspects of deploying virtual and physical lab environments for region-wide learners in a synchronous-style distance learning workshop. Keywords Hands-on computer workshop, remote laboratory, distance learning, educational technology 1 Introduction With digital and telecommunication technologies, distance education has been developed to extend boundary of knowledge sharing to be more location and time independent. It has been widely deployed in academic or training programs to mobilize knowledge within or across organizations, countries and regions. With its characteristic to share knowledge to more learners at remote locations, it has become a costeffective solution for human resource development. In the digital age which daily operations of humans are computer-assisted, practical skills to use computers to accomplish specialized tasks in different fields are...

Words: 4133 - Pages: 17

Free Essay

Wireless Paper

...J. Chem. Chem. Eng. 5 (2011) 897-902 Remote Control of Fed-Batch Fermentation Systems Eric Moreau3, Floyd Inman, III1, Sunita Singh2, Heather Walters1 and Leonard Holmes1* 1. Biotechnology Research and Training Center, University of North Carolina at Pembroke, Pembroke, NC, USA 2. Central Institute of Agricultural Engineering, Bhopal, Madhya Pradesh, India 3.Université de Picardie Jules Verne, Amiens, France Received: June 14, 2011 / Accepted: July 11, 2011 / Published: October 10, 2011. Abstract: Bioreactor operation requires continuous monitoring of fermentation parameters and real-time control over bioreactor devices. Remote monitoring and control of the bioreactor’s computer via the Internet avoids the necessity of personnel being continually onsite during operation. A two liter Sartorius-stedim Biostat® A Plus fermentation system was networked and interfaced with the commercial software from GoToMyPC® to allow remote control of the fermentation system utilizing the internet. The fermentation vessel was equipped with hardware calibrated for monitoring and controlling culture parameters during experimentations. The uniform resource locator controlled night-vision web camera allowed continuous monitoring of the glass fermentation vessel during the day and at night. The main window screen of the laboratory computer can be securely accessed from any portable device (i.e. laptop) capable of establishing an Internet connection and executing the commercial software from GoToMyPC®...

Words: 2136 - Pages: 9

Premium Essay

It 230 Computer Networking

...Network Design: XYZ School System Network Design: XYZ School System IT 230 Computer Networking Executive Summary {complete during Week Nine} Write 3-4 paragraphs describing the goals of the network design project, assumptions, pros and cons of the proposed solutions, and project constraints. Cabling Specifications 1. The following specification represents the minimum requirements for the installation of cabling and equipment data cabling in any offices or labs to be constructed or modified for the XYZ School System. 2. Minimum Cabling Requirements a. The Data Cabling and termination shall be in accordance with wiring configurations as per ANSI/TIA/EIA-568-B standards b. All cabling runs must be uninterrupted and without splices c. Where cabling is to be enclosed in a solid wall, the cables should be installed within a conduit for a additions or reconfigurations 3. General Specifications a. Data cable (CAT-6 UTP) i. Terminating method: CAT-6 socket 1. Green/White (1) 2. Green (2) 3. Orange/White (3) 4. Blue (4) 5. Blue/White (5) 6. Orange (6) 7. Brown/White (7) 8. Brown (8) ii. Each data point should have all 4pairs assigned and terminated as per ANSI/TIA/EIA-568-B standards b. Cables Labeling i. Data plates 1. On each face plate a unique number will be used to indicate the data’s location of cable termination on the patch panel 2. The data ports will be marked with orange labeling for each data connection ii. Wiring labels 1. Each cable will be sequentially numbered...

Words: 6096 - Pages: 25

Premium Essay

Information Security

...plan, the company must access its most important assets; identify vulnerabilities as well as the infrastructure and technology most appropriate for mitigating risk, then implement a strategy for putting the plan in action. Emails are prime examples. It has become a critical business communications tool and is also a primary conduit for malicious code. Protecting emails against viruses, worms, spam, Trojan horses, phishing attacks and other threats requires a variety of security technologies. These antivirus and antispyware software, content filtering, and firewalls. Such security technologies must be installed at various levels of the infrastructure-such as the gateway, mail servers and desktop or laptop. This way, threats that may bypass one level are dealt with at another. In addition, layering security helps mitigate the risk of an employee who disables protection on his or her desktop. The gateway serves as an entry and exit point to the company network. By installing a security solution such as antivirus and content filtering at this tier, mass-mailer worms are scanned and deleted and spam is moved to quarantines. Mail servers should also be equipped with security. These systems receive, send, and store email, and an email security solution work together with the email program to provide a greater degree of protection against malicious code. The User Domain defines the people who access an organization’s information system. Users can access systems, applications...

Words: 1445 - Pages: 6