Remote Access

Topics: Virtual private network, Computer network, Cryptography Pages: 6 (1553 words) Published: August 4, 2013
Remote Access

Remote access • refers to the ability to access a computer, such as a home computer or an office network computer, from a remote location. • Remote access can be set up using a local area network (LAN), wide area network (WAN) or even a virtual private network (VPN) so that resources and systems can be accessed remotely. • To establish a remote connection, both the local machine and the remote computer/server must have remote-access software. Alternatively, there are service providers that offer remote access via the Internet.

• Another method for performing remote access is by establishing a VPN, a network that usually uses the Internet to connect remote sites and users together. • This type of network uses encryption and tunnelling to access a company’s network. This can be a great choice for a relatively small organization.

• This involve a computer, a modem, and some remote access software to connect to the network. Also include the use of an integrated services digital network (ISDN), wireless network, cable modem or digital subscriber line.

Virtual Private Networks (VPN) • is an encrypted connection that is carried across a shared public infrastructure in a manner that makes it appear to be a dedicated and secure link between two cooperating nodes.

• VPN allow organizations to use the public Internet for access to corporate data without the risk of authorized access to the information. • Data is encrypted at both ends making it impossible for a third party to steal or damage secure information.

• VPN started in 1995 with the Automotive Industry Action Group (AIAG) and their creation of the Automotive Network Exchange project, which was developed to fulfil a need for efficient and secure communications between trading partners, certified service providers, and network exchange points.  Two Key Technology used implementing VPN ( IPSec and PPTP) when

 IPSec is a set of extensions to the IP protocol family. It works pretty much the same for both IPv4 and IPv6. It provides two basic services, and a large number of variants on them.

IPSec provides two service: 1. Authentication and Verification - Authentication means that you can be sure that the data came from who it says it came from. - Verification means that you can be sure that it hasn't been altered. 2. Confidentiality - Confidentiality means that the contents are not visible to third parties, even if they have access to the data in transit.

 PPTP ( Point-to-Point Tunneling Protocol) - is a protocol (set of communication rules) that allows corporations to extend their own corporate network through private "tunnels" over the public Internet.

 Tunneling is a technology that enables one network to send its data via network’s connections.

- Tunneling works by encapsulating a network protocol within packets carried by a second network. This allow the Internet service provider to act merely as a transporter of a data stream that has been encrypted prior to initial transmission

Headquart ers

Types of VPNs • Intranet VPN • Extranet VPN • Remote access VPN Intranet VPN - a corporation with multiple facilities that need to be able to intercommunicate uses an intranet VPN. - at each location, a VPN, device is implemented. These connections are between trusted users because the connection is between users within the same organization. After the trusted user has been authenticated, the VPN should provide the same access to corporate resources as if the remote users were directly connected.

- the security policy enforced by the intranet VPN is usually the standard corporate policy.

Extranet VPN - similar to the intranet model, except that the remote site consists of user belonging to different corporations, with one business community partnering with another business community. - this connection involves communication between untrusted users. - Extranet VPN security requirements are more stringent. - What...
Continue Reading

Please join StudyMode to read the full document

You May Also Find These Documents Helpful

  • remote access control policy Essay
  • Remote Access Essay
  • Access Control Policy Essay
  • remote sensing Essay
  • The Tv Remote Research Paper
  • Infrared Remote Control Switch Essay
  • Remote Development On CAEN With Eclipse Essay
  • Remote Desktop and Local Administrator Rights Essay

Become a StudyMode Member

Sign Up - It's Free