Remote Access

Good Essays
Richman Investments

To: Senior Manager

From: Intern

Good day to you and anyone reading this correspondence. I have been tasked by the IT security team to draft a Remote Access Standard to be implemented within the current security infrastructure. Knowing the types of things that could come about from insecure resources I’d like to offer a solution to issues that may come about from using process like VPN and remote access for people that telework into the office from home.
Having multiple levels of access controls will help keep this a minimum risk.

The integrity of the company is a great thing and having the reputation of being one of the most secured companies in the world is nothing to be taken lightly. Having a tool in place that will give you a leg up on the bad guys that want to get at the information that you are keeping at the highest levels of security is invaluable. Trade secrets, highly classified documents and customer, client, vendor information are always the first things that a hacker wants to take advantage of within a corporation such as this.

General Atlantic LLC provides a way for people to access areas of extreme secrecy by ways of key fobs. A key fob is a small device that is connected to a set of keys issued to an employee in an advanced step to authentication for access to certain areas of a website or server remotely. The SecurID SID 800 is one of the most common ways to provide a passcode to a website or even a client computer. The keys generate a randomized 6 digit number in a way that it would never be duplicated so there is always a secure passcode when accessing the server.
This two part authentication process would be added to every access point either remotely or locally by any and all employees within Richman Investments. I’ve had to use this device in several of my customer service positions because there was always sensitive information that I didn’t need to see and if there was nothing in place to prevent me

You May Also Find These Documents Helpful

  • Powerful Essays

    Remote Access

    • 1553 Words
    • 7 Pages

    Remote Access Remote access • refers to the ability to access a computer, such as a home computer or an office network computer, from a remote location. • Remote access can be set up using a local area network (LAN), wide area network (WAN) or even a virtual private network (VPN) so that resources and systems can be accessed remotely. • To establish a remote connection, both the local machine and the remote computer/server must have remote-access software. Alternatively, there are service providers…

    • 1553 Words
    • 7 Pages
    Powerful Essays
  • Good Essays

    remote access policy

    • 464 Words
    • 2 Pages

    Remote access policy Purpose The purpose of this policy will provide the standards for connecting to any DoD networks from any host. These standards are created and designed to minimize any potential exposure to DoD network (s) from damage which may result from unauthorized user or access of DoD networks. Damages include loss of confidential or sensitive data, intellectual data, and damage to critical DoD internal systems. Scope This policy will apply to all DoD employees, contractors, vendors…

    • 464 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    remote access it255

    • 345 Words
    • 2 Pages

    Write a remote access security policy covering the most important security risk. 1) Wireless Access When the network is accessed remotely via wireless appropriate wireless security standards will be used. • Wired Equivalency Protocol (WEP) will be used as standard on Wi-Fi connections. • A WEP encryption key will be used. • The network will be configured not to advertise its presence. • The power of access points will be turned down to a minimum that still allows the access point…

    • 345 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    with remote access privileges to Richman Investments' networks to ensure that their remote access connection is given the same consideration as the user's on-site connection to the company. 2. General access to the Internet for recreational use by employees is discouraged through the Richman Investments Network. Employees of Richman Investments are responsible to ensure they do not violate any policies or perform illegal activities. All employees are accountable of their actions. 3. Access to Richman…

    • 254 Words
    • 2 Pages
    Satisfactory Essays
  • Better Essays

    Dear Richman Investments, I have reviewed your needs and circumstances and have designed a remote access control policy that will work for you and your company. This is a multi-layered security system that consists of the user’s domain. The user is the first and the weakest link in any system. The security is only as strong as the user’s ability to understand what can go wrong. We can implement a training program session for security awareness. Another security measure is to implement a policy…

    • 775 Words
    • 4 Pages
    Better Essays
  • Better Essays

    Remote Access Standards for Richman Investments Remote Access Standards for Richman Investments Purpose: This document is designed to provide definition of the standards for connecting remotely to Richman Investments’ network outside of the company’s direct network connection. The standards defined here are designed to mitigate exposure to potential damage to Richman Investments’ network, resulting from the use of unauthorized use of network resources. Scope: All Richman Investments agents, vendors…

    • 1109 Words
    • 4 Pages
    Better Essays
  • Good Essays

    Remote Access Policy 1. Overview See Purpose. 2. Purpose The purpose of this policy is to define standards for connecting to Corona District High School's network from any host. These standards are designed to minimize the potential exposure to Corona District High School from damages which may result from unauthorized use of Corona District High School resources. Damages include the loss of sensitive or company confidential data, intellectual property, damage to public image, damage to critical…

    • 848 Words
    • 4 Pages
    Good Essays
  • Good Essays

    2.7 Remote Access Policy 2.7.1 It is the responsibility of all Meditech employees, contractors and vendors with remote access privileges to Meditech ‘s corporate network to ensure that their remote access connection is given the same consideration as the user's on-site connection to Meditech. 2.7.2 Secure remote access must be strictly controlled. Control will be enforced by two factor authentication. 2.7.3 Vendor accounts with access to the company network will only be enabled during the time period…

    • 827 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    Remote Access Control Policy for Richman Investments Authorization- Richman Investments must define rules as to who has access to which computer and network resources. My suggestion is that RI implements either a group membership policy or an authority-level policy to achieve this. Group policy would allow the administrator to assign different privileges to different groups. The admin would then assign different individual users to those different groups. So the users permissions would depend…

    • 302 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Unit 8 Discussion 1: Remote Access Method Evaluation IS 3230 Remote Access Method Evaluation Many companies inform their IT’s as to who will receive access to the network and what type of equipment they will be using. It could be from an older vpn that needs a software package to run on a trustworthy network, which would be safe to run from a home PC or smartphone. No network is ever 100% secure. Companies should access their needs and risks, and then write their acceptable…

    • 279 Words
    • 2 Pages
    Satisfactory Essays