Preview

Remote Access

Good Essays
Open Document
Open Document
496 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Remote Access
Richman Investments

To: Senior Manager

From: Intern

Good day to you and anyone reading this correspondence. I have been tasked by the IT security team to draft a Remote Access Standard to be implemented within the current security infrastructure. Knowing the types of things that could come about from insecure resources I’d like to offer a solution to issues that may come about from using process like VPN and remote access for people that telework into the office from home.
Having multiple levels of access controls will help keep this a minimum risk.

The integrity of the company is a great thing and having the reputation of being one of the most secured companies in the world is nothing to be taken lightly. Having a tool in place that will give you a leg up on the bad guys that want to get at the information that you are keeping at the highest levels of security is invaluable. Trade secrets, highly classified documents and customer, client, vendor information are always the first things that a hacker wants to take advantage of within a corporation such as this.

General Atlantic LLC provides a way for people to access areas of extreme secrecy by ways of key fobs. A key fob is a small device that is connected to a set of keys issued to an employee in an advanced step to authentication for access to certain areas of a website or server remotely. The SecurID SID 800 is one of the most common ways to provide a passcode to a website or even a client computer. The keys generate a randomized 6 digit number in a way that it would never be duplicated so there is always a secure passcode when accessing the server.
This two part authentication process would be added to every access point either remotely or locally by any and all employees within Richman Investments. I’ve had to use this device in several of my customer service positions because there was always sensitive information that I didn’t need to see and if there was nothing in place to prevent me

You May Also Find These Documents Helpful

  • Better Essays

    To properly secure an information system means protecting its files and other confidential information from misuse. The current speed of technological growth requires ever evolving security measures to follow these developments. As the members of Team “A” set out to address this need, it was necessary to discuss the requirements. The foundation of all concrete security plans require a detailed knowledge of all current systems, the tools needed to accomplish security needs and employee training. The implementation of these requirements will be outlined within a final Security Presentation.…

    • 2101 Words
    • 8 Pages
    Better Essays
  • Satisfactory Essays

    NT2580 Project Part 1

    • 348 Words
    • 1 Page

    Access to the company network will be secured by multiple firewalls set up with our routers. Firewall filters will be set up with a specific list of allowed users and programs. All other traffic will be blocked by default until it has been approved by IT. There will be a limited number of wireless access points around the building, with password access. These passwords will be changed on a regular basis. Access to the local network will be secured by user authentication passwords. Users will be limited to only the system resources that they absolutely need to complete their work. Users’ passwords must be changed every 90 days.…

    • 348 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    Router Management Out-of-Band Management Username and Password Authentication. Traffic VPN and Tunnel Based Traffic ACL and Tunnel Traffic Established Between Trusted End Points. UDP and TCP Protocol Enforcement with Stateful Firewall Access list Source and Destination, Address and Session established with Layer 7 Firewall Protection.…

    • 155 Words
    • 2 Pages
    Satisfactory Essays
  • Best Essays

    Anis, I., Hajjar, M., & Hajjar H., (2008). Remote Administration Tools: A Comparative Study. Journal of Theoretical and Applied Information Technology.…

    • 1489 Words
    • 5 Pages
    Best Essays
  • Satisfactory Essays

    For the remote access domain, we need a secure VPN so that employees are not exposing sensitive data to anyone outside of our network. To do this everyone must authenticate to the system for authorization.…

    • 337 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Lab 7 & 8

    • 1094 Words
    • 5 Pages

    Authorized secure remote access, Traffic inspection and Coordinated Threat Control, Centralized security management and enterprise-wide visibility and control.…

    • 1094 Words
    • 5 Pages
    Powerful Essays
  • Good Essays

    The Remote Access will provide the Virtual Private Networks with services that the users can use to access the corporate networks over the Internet as it they were directly connected. This remote access will enable the remote…

    • 623 Words
    • 3 Pages
    Good Essays
  • Good Essays

    The project will be a multi-year phased approach to have all sites (except JV and SA) on the same hardware and software platforms.…

    • 991 Words
    • 4 Pages
    Good Essays
  • Good Essays

    Network: The network should be designed with security in mind. Its structure must support the company’s policies, relevant laws and regulations, without impairing the organization’s ability to conduct business. The network should be logically and physically separated into distinct and manageable security zones. Traffic between the security zones must be inspected and filtered, to ensure that only authorized network use is permitted, and all access is recorded for future auditing. Multiple devices and methods should be used to ensure security across all parts of the network. In preparing this recommendation, network security design principles have been drawn from the Cisco SAFE Reference Guide [33] and the Council on CyberSecurity’s Critical Security Controls for Effective Cyber Defense Version 5.1 [34].…

    • 598 Words
    • 3 Pages
    Good Essays
  • Good Essays

    NT2580 Project part 1

    • 606 Words
    • 3 Pages

    Safety of data and information is a real important aspect of a company. Before we can create an outline for general security solutions we must first define what is needed. I recommend that we use a multi-layered security plan. There are a total of seven domains of an IT infrastructure including user domain, workstation domain, LAN domain, LAN-to-WAN domain, WAN domain, remote access domain, and system/application domain.…

    • 606 Words
    • 3 Pages
    Good Essays
  • Good Essays

    LAB 3

    • 368 Words
    • 2 Pages

    1. What are the three fundamental elements of an effective access control solution for information systems?…

    • 368 Words
    • 2 Pages
    Good Essays
  • Good Essays

    operations in organisations and business environments. Security threats on the remote machines can always be averted easily and their impacts are not as serious compared to threats on the central computer system (Kaufman et al, 2002).The central computer system is a valuable resource that must be secured to ensure continued operation in the organisation. Securing a central computer network is the key to ensuring network security in any institution (Kaeo, 1999).…

    • 349 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    One security options that can be used is the Privacy or confidentiality. Using this will help keep information confidently from others or outsiders unless you are authorized. This will keep employees from finding things such as SSN (social security numbers), personal home address, and/or documents that may be considered sensitive. Having this as a security option is an all-around good idea. I would implement this on all of the networks/domains that I would manage.…

    • 385 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Feedback: Christine this is a good start where you have demonstrated a sound understanding of ways to maintain a secure work environment. Can you take it one step further and provide a specific example of how security can be maintained also? Consider some of the ways that this is done at your current or previous workplace. (2.3)…

    • 620 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    There are numerous techniques that the Information Technology industry can use in order to substantiate an entities identity, have the ability to authenticate that entity and provide the appropriate authorization for that entity to have access to a networks resource. There are many diverse techniques that are obtainable to accomplish this task.…

    • 630 Words
    • 3 Pages
    Good Essays