Remote Access Method Evaluation

Topics: Software engineering, Transport, Internet Pages: 1 (298 words) Published: November 29, 2013

Unit 8 Discussion 1: Remote Access Method Evaluation IS 3230

Remote Access Method Evaluation
Many companies inform their IT’s as to who will receive access to the network and what type of equipment they will be using. It could be from an older vpn that needs a software package to run on a trustworthy network, which would be safe to run from a home PC or smartphone. No network is ever 100% secure. Companies should access their needs and risks, and then write their acceptable use policies. Some companies may find it easier to rent a secure cloud app rather than installing in-house software, but this may not meet all of the company’s needs. Companies using remote access VPN’s will see a return on money spent, so this method is cost effective. Other benefits of using this method are standardized software, “Out of the Box”, modular software architecture and matched VPN components. If the companies have a high employee turnovers it would not be cost effective to use this method. This service provides an end to end encrypted tunnel. The “Out of the Box” can be upgraded and the VPN has wide scalability, so that companies can be more mobile. If anything else is open on computer and transporting data it would be easy for someone to view those files that are open. Hypertext transport protocol over SSL uses certificates and public key to encrypt the transportation of data. HTTPS sends data in plain text, after connected with a SSL connection all data is encrypted from that point. Even though it may cost more to use HTTPS, this is the safer way to go.


Continue Reading

Please join StudyMode to read the full document

You May Also Find These Documents Helpful

  • Remote Access Essay
  • Essay about Remote Access
  • Remote Access Essay
  • remote access it255 Essay
  • remote access control policy Essay
  • Essay on NT 2799 Remote Access Policy
  • Remote Access Control Policies Essay
  • lab 8 Access Controls Essay

Become a StudyMode Member

Sign Up - It's Free