Disciplines
- MLA
- APA
- Master's
- Undergraduate
- High School
- PhD
- Harvard
- Biology
- Art
- Drama
- Movies
- Theatre
- Painting
- Music
- Architecture
- Dance
- Design
- History
- American History
- Asian History
- Literature
- Antique Literature
- American Literature
- Asian Literature
- Classic English Literature
- World Literature
- Creative Writing
- English
- Linguistics
- Law
- Criminal Justice
- Legal Issues
- Ethics
- Philosophy
- Religion
- Theology
- Anthropology
- Archaeology
- Economics
- Tourism
- Political Science
- World Affairs
- Psychology
- Sociology
- African-American Studies
- East European Studies
- Latin-American Studies
- Native-American Studies
- West European Studies
- Family and Consumer Science
- Social Issues
- Women and Gender Studies
- Social Work
- Natural Sciences
- Anatomy
- Zoology
- Ecology
- Chemistry
- Pharmacology
- Earth science
- Geography
- Geology
- Astronomy
- Physics
- Agriculture
- Agricultural Studies
- Computer Science
- Internet
- IT Management
- Web Design
- Mathematics
- Business
- Accounting
- Finance
- Investments
- Logistics
- Trade
- Management
- Marketing
- Engineering and Technology
- Engineering
- Technology
- Aeronautics
- Aviation
- Medicine and Health
- Alternative Medicine
- Healthcare
- Nursing
- Nutrition
- Communications and Media
- Advertising
- Communication Strategies
- Journalism
- Public Relations
- Education
- Educational Theories
- Pedagogy
- Teacher's Career
- Statistics
- Chicago/Turabian
- Nature
- Company Analysis
- Sport
- Paintings
- E-commerce
- Holocaust
- Education Theories
- Fashion
- Shakespeare
- Canadian Studies
- Science
- Food Safety
- Relation of Global Warming and Extreme Weather Condition
Paper Types
- Movie Review
- Essay
- Admission Essay
- Annotated Bibliography
- Application Essay
- Article Critique
- Article Review
- Article Writing
- Assessment
- Book Review
- Business Plan
- Business Proposal
- Capstone Project
- Case Study
- Coursework
- Cover Letter
- Creative Essay
- Dissertation
- Dissertation - Abstract
- Dissertation - Conclusion
- Dissertation - Discussion
- Dissertation - Hypothesis
- Dissertation - Introduction
- Dissertation - Literature
- Dissertation - Methodology
- Dissertation - Results
- GCSE Coursework
- Grant Proposal
- Admission Essay
- Annotated Bibliography
- Application Essay
- Article
- Article Critique
- Article Review
- Article Writing
- Assessment
- Book Review
- Business Plan
- Business Proposal
- Capstone Project
- Case Study
- Coursework
- Cover Letter
- Creative Essay
- Dissertation
- Dissertation - Abstract
- Dissertation - Conclusion
- Dissertation - Discussion
- Dissertation - Hypothesis
- Dissertation - Introduction
- Dissertation - Literature
- Dissertation - Methodology
- Dissertation - Results
- Essay
- GCSE Coursework
- Grant Proposal
- Interview
- Lab Report
- Literature Review
- Marketing Plan
- Math Problem
- Movie Analysis
- Movie Review
- Multiple Choice Quiz
- Online Quiz
- Outline
- Personal Statement
- Poem
- Power Point Presentation
- Power Point Presentation With Speaker Notes
- Questionnaire
- Quiz
- Reaction Paper
- Research Paper
- Research Proposal
- Resume
- Speech
- Statistics problem
- SWOT analysis
- Term Paper
- Thesis Paper
- Accounting
- Advertising
- Aeronautics
- African-American Studies
- Agricultural Studies
- Agriculture
- Alternative Medicine
- American History
- American Literature
- Anatomy
- Anthropology
- Antique Literature
- APA
- Archaeology
- Architecture
- Art
- Asian History
- Asian Literature
- Astronomy
- Aviation
- Biology
- Business
- Canadian Studies
- Chemistry
- Chicago/Turabian
- Classic English Literature
- Communication Strategies
- Communications and Media
- Company Analysis
- Computer Science
- Creative Writing
- Criminal Justice
- Dance
- Design
- Drama
- E-commerce
- Earth science
- East European Studies
- Ecology
- Economics
- Education
- Education Theories
- Educational Theories
- Engineering
- Engineering and Technology
- English
- Ethics
- Family and Consumer Science
- Fashion
- Finance
- Food Safety
- Geography
- Geology
- Harvard
- Healthcare
- High School
- History
- Holocaust
- Internet
- Investments
- IT Management
- Journalism
- Latin-American Studies
- Law
- Legal Issues
- Linguistics
- Literature
- Logistics
- Management
- Marketing
- Master's
- Mathematics
- Medicine and Health
- MLA
- Movies
- Music
- Native-American Studies
- Natural Sciences
- Nature
- Nursing
- Nutrition
- Painting
- Paintings
- Pedagogy
- Pharmacology
- PhD
- Philosophy
- Physics
- Political Science
- Psychology
- Public Relations
- Relation of Global Warming and Extreme Weather Condition
- Religion
- Science
- Shakespeare
- Social Issues
- Social Work
- Sociology
- Sport
- Statistics
- Teacher's Career
- Technology
- Theatre
- Theology
- Tourism
- Trade
- Undergraduate
- Web Design
- West European Studies
- Women and Gender Studies
- World Affairs
- World Literature
- Zoology
Implementing Network and Personnel Security Measures, Research Paper Example
Hire a Writer for Custom Research Paper
Use 10% Off Discount: "custom10" in 1 Click 👇
You are free to use it as an inspiration or a source for your own work.
Connectivity of Remote Users
Corporate organizations spent an enormous amount of money for securing the computer networks and valuable data. There are many techniques and methods introduced in the past for protecting networks. Several encryption techniques are injected between the data flow from one network to another. Organizations prefer technology with low cost and high efficiency, providing network protection and security internally and externally. This proposal provides detailed technical mechanism of connecting remote users in a secure way. It presents the technical processes that an organization will implement in order to conduct the remote access server connectivity (Bannan & Berinato, 1998). The RAS offers insights evaluator on their implementation and the probable impact they may have on systems and networks. In order to conduct a successful assessment, having a positive impact on the security posture of a system on the entire organization, elements of the examination must maintain the technical procedure. The process enables organizations to develop a policy of information security assessment and methodology (Smith, 2004). Identification of individual roles, related to technical procedures is also the aspects of the assessment.
Evaluation of networks is an essential activity for measuring the current security mechanism. This activity identifies the probability of potential threats as well as threats already available within the network. For eliminating the potential and existing threats, Dial in RAS security is implemented. What is Remote Access Server (RAS)? A clear definition is available in the computer desktop encyclopedia which says “A computer in a network that provides access to remote users via an Internet or dial-up connection”. Many organizations are saving money by providing access to networks from remote locations. The executives, staff and others need to connect to the organization’s network when they in mobile resources and need to access network resources also on the weekends from a remote location.
RAS initiates remote access techniques for vulnerabilities, they cover computing servers such as dial up modems, tunnels of secure shell (SSH), terminal servers, applications associated with remote desktop (Charles, 2000). The alternative methods are adapted in this procedure for entering in circumvents perimeter defenses. Remote access also follows penetration testing methodology, but can also be executed separately to emphasize on deployments associated with remote access. Testing techniques differ from type of remote access services being tested and the specific goals of the test. Information security assessment enables the organization to evaluate and test the network, hosts, system, procedure, and person. The organization will able to eliminate essential process by the following methodologies conducted by the RAS server (Charles, 2000):
Unauthorized Remote Access Services
Port scanning will locate open ports that are often associated with remote access services. Systems are manually checked for remote access services by viewing running processes and installed applications. Moreover, unnecessary application, accounts, utilities, tools needs to be removed from the system for preventing it from hackers, threats, malicious codes, root kits and adware.
Evaluating rules for remote access paths
Rules sets which are applied on Virtual private network gateways are reviewed for vulnerabilities, oversights or miss configurations that could authorize unwanted entrance for hackers.
RAS authentication mechanism
The remote access methods normally require authentication. The remote user will first authorize them in to the authentication system by giving user credentials. Brute force attack is initiated for getting in to the network or gain access without an authentication token. Social engineering techniques are used for breaking the password by asking general questions via a self-service authentication program (Charles, 2000).
Network Security Devices
A testing tool “network sniffer” is used for monitoring remote access communications. If there are flaws and loop holes in the communications process, testers will utilize them as sources for remote access authentication information and other data sent and received by remote access users. Live testing of remote access connections, is performed during off peak hours of the organization to limit potential disruption to employees and the remote access systems. The testing will be conducted with the administrator ID having full permission and right to perform actions and administrative tasks.
Cost
For incorporating the RAS within the network, a system with an operating system and RAS server is required. However, two separate systems can only be implemented where one system will be the host and the second will be a remote server. Both of the system must have a modem installed. One network access server and telephone switch is required. A separate VLAN can also be considered, as far as security is concerned.
Maintenance Plan
The RAS will be dependent on the operating system that will be hosting the system. Effective patch management procedures must be in place for keeping the system up to date with the updated security fixes and patch, as this applied to both i.e. operating system as well as RAS server. If the system is outdated and is left unpatched, the operating system hosting the RAS server can be compromised and unauthorized remote access sessions can be created by the hacker for gaining access remotely to the network. As a result, critical information residing within the system can be at high risk.
Physical Security Measures
The RAS server must be located within a controlled environment such as the data center. Likewise, the data center must have the following physical controls:
- Biometric Access only to the relevant personnel
- Close Circuit Cameras
- Visitor Sign in logs, for example vendor visiting the data center
- Fire extinguishers
The maintenance, firmware/software updates for the biometric device can be managed by the vendor as per the maintenance contract. Likewise, to make the biometric device effective and functional at all times, vendor should be contacted in case of any sort of unavailability issues. Moreover, fire extinguisher vendor also needs to be contacted, as these fire extinguishers have expiry dates and they need to be refilled periodically. However, Co2 gas fire extinguishers are recommended for data center environment, as they will be more effective as compared to a power based fire extinguishers.
Human Resource Security
The Human resource function will intimate the network and security team for any updates within the employee information such as change in their job description, change in role, termination, resignation etc. The network and security team will then activate/deactivate remote access for those employees for mitigating any risks associated with unauthorized access. For instance, if an employee has resigned and still his account is active in the RAS server, there is a high probability that the account can be misused and there will be no one who can be held accountable, in spite of getting audit trails that may assist investigations. Moreover, these unused active accounts can also be utilized by the hacker for gaining a legitimate access to the networks and systems from a remote location.
References
Bannan, K. J., & Berinato, S. (1998). Server makers add remote access. PC Week, 15(3), 10.
Charles, K. (2000). Windows 2000 routing and remote access services New Riders Publishing.
Smith, R. F. (2004). Set up remote access policies to secure VPN access. Security Administrator, 4(9), 9-12.
Stuck with your Research Paper?
Get in touch with one of our experts for instant help!
Time is precious
don’t waste it!
writing help!
Plagiarism-free
guarantee
Privacy
guarantee
Secure
checkout
Money back
guarantee
