All papers examples
Get a Free E-Book!
Log in
HIRE A WRITER!
Paper Types
Disciplines
Get a Free E-Book! ($50 Value)

Implementing Network and Personnel Security Measures, Research Paper Example

Pages: 4

Words: 1136

Research Paper

Connectivity of Remote Users

Corporate organizations spent an enormous amount of money for securing the computer networks and valuable data. There are many techniques and methods introduced in the past for protecting networks. Several encryption techniques are injected between the data flow from one network to another. Organizations prefer technology with low cost and high efficiency, providing network protection and security internally and externally. This proposal provides detailed technical mechanism of connecting remote users in a secure way. It presents the technical processes that an organization will implement in order to conduct the remote access server connectivity (Bannan & Berinato, 1998). The RAS offers insights evaluator on their implementation and the probable impact they may have on systems and networks. In order to conduct a successful assessment, having a positive impact on the security posture of a system on the entire organization, elements of the examination must maintain the technical procedure. The process enables organizations to develop a policy of information security assessment and methodology (Smith, 2004). Identification of individual roles, related to technical procedures is also the aspects of the assessment.

Evaluation of networks is an essential activity for measuring the current security mechanism. This activity identifies the probability of potential threats as well as threats already available within the network. For eliminating the potential and existing threats, Dial in RAS security is implemented. What is Remote Access Server (RAS)? A clear definition is available in the computer desktop encyclopedia which says A computer in a network that provides access to remote users via an Internet or dial-up connection”. Many organizations are saving money by providing access to networks from remote locations. The executives, staff and others need to connect to the organization’s network when they in mobile resources and need to access network resources also on the weekends from a remote location.

RAS initiates remote access techniques for vulnerabilities, they cover computing servers such as dial up modems, tunnels of secure shell (SSH), terminal servers, applications associated with remote desktop (Charles, 2000). The alternative methods are adapted in this procedure for entering in circumvents perimeter defenses. Remote access also follows penetration testing methodology, but can also be executed separately to emphasize on deployments associated with remote access. Testing techniques differ from type of remote access services being tested and the specific goals of the test. Information security assessment enables the organization to evaluate and test the network, hosts, system, procedure, and person. The organization will able to eliminate essential process by the following methodologies conducted by the RAS server (Charles, 2000):

Unauthorized Remote Access Services

Port scanning will locate open ports that are often associated with remote access services. Systems are manually checked for remote access services by viewing running processes and installed applications. Moreover, unnecessary application, accounts, utilities, tools needs to be removed from the system for preventing it from hackers, threats, malicious codes, root kits and adware.

Evaluating rules for remote access paths

Rules sets which are applied on Virtual private network gateways are reviewed for vulnerabilities, oversights or miss configurations that could authorize unwanted entrance for hackers.

RAS authentication mechanism

The remote access methods normally require authentication. The remote user will first authorize them in to the authentication system by giving user credentials. Brute force attack is initiated for getting in to the network or gain access without an authentication token. Social engineering techniques are used for breaking the password by asking general questions via a self-service authentication program (Charles, 2000).

Network Security Devices

A testing tool “network sniffer” is used for monitoring remote access communications. If there are flaws and loop holes in the communications process, testers will utilize them as sources for remote access authentication information and other data sent and received by remote access users. Live testing of remote access connections, is performed during off peak hours of the organization to limit potential disruption to employees and the remote access systems. The testing will be conducted with the administrator ID having full permission and right to perform actions and administrative tasks.

Cost

For incorporating the RAS within the network, a system with an operating system and RAS server is required. However, two separate systems can only be implemented where one system will be the host and the second will be a remote server. Both of the system must have a modem installed. One network access server and telephone switch is required. A separate VLAN can also be considered, as far as security is concerned.

Maintenance Plan

The RAS will be dependent on the operating system that will be hosting the system. Effective patch management procedures must be in place for keeping the system up to date with the updated security fixes and patch, as this applied to both i.e. operating system as well as RAS server. If the system is outdated and is left unpatched, the operating system hosting the RAS server can be compromised and unauthorized remote access sessions can be created by the hacker for gaining access remotely to the network. As a result, critical information residing within the system can be at high risk.

Physical Security Measures

The RAS server must be located within a controlled environment such as the data center. Likewise, the data center must have the following physical controls:

  • Biometric Access only to the relevant personnel
  • Close Circuit Cameras
  • Visitor Sign in logs, for example vendor visiting the data center
  • Fire extinguishers

The maintenance, firmware/software updates for the biometric device can be managed by the vendor as per the maintenance contract. Likewise, to make the biometric device effective and functional at all times, vendor should be contacted in case of any sort of unavailability issues. Moreover, fire extinguisher vendor also needs to be contacted, as these fire extinguishers have expiry dates and they need to be refilled periodically. However, Co2 gas fire extinguishers are recommended for data center environment, as they will be more effective as compared to a power based fire extinguishers.

Human Resource Security

The Human resource function will intimate the network and security team for any updates within the employee information such as change in their job description, change in role, termination, resignation etc. The network and security team will then activate/deactivate remote access for those employees for mitigating any risks associated with unauthorized access. For instance, if an employee has resigned and still his account is active in the RAS server, there is a high probability that the account can be misused and there will be no one who can be held accountable, in spite of getting audit trails that may assist investigations. Moreover, these unused active accounts can also be utilized by the hacker for gaining a legitimate access to the networks and systems from a remote location.

References

Bannan, K. J., & Berinato, S. (1998). Server makers add remote access. PC Week, 15(3), 10.

Charles, K. (2000). Windows 2000 routing and remote access services New Riders Publishing.

Smith, R. F. (2004). Set up remote access policies to secure VPN access. Security Administrator, 4(9), 9-12.

Time is precious

Time is precious

don’t waste it!

Get instant essay
writing help!
Get instant essay writing help!
Plagiarism-free guarantee

Plagiarism-free
guarantee

Privacy guarantee

Privacy
guarantee

Secure checkout

Secure
checkout

Money back guarantee

Money back
guarantee

Related Research Paper Samples & Examples

The Risk of Teenagers Smoking, Research Paper Example

Introduction Smoking is a significant public health concern in the United States, with millions of people affected by the harmful effects of tobacco use. Although, [...]

Pages: 11

Words: 3102

Research Paper

Impacts on Patients and Healthcare Workers in Canada, Research Paper Example

Introduction SDOH refers to an individual’s health and finances. These include social and economic status, schooling, career prospects, housing, health care, and the physical and [...]

Pages: 7

Words: 1839

Research Paper

Death by Neurological Criteria, Research Paper Example

Ethical Dilemmas in Brain Death Brain death versus actual death- where do we draw the line? The end-of-life issue reflects the complicated ethical considerations in [...]

Pages: 7

Words: 2028

Research Paper

Ethical Considerations in End-Of-Life Care, Research Paper Example

Ethical Dilemmas in Brain Death Ethical dilemmas often arise in the treatments involving children on whether to administer certain medications or to withdraw some treatments. [...]

Pages: 5

Words: 1391

Research Paper

Ethical Dilemmas in Brain Death, Research Paper Example

Brain death versus actual death- where do we draw the line? The end-of-life issue reflects the complicated ethical considerations in healthcare and emphasizes the need [...]

Pages: 7

Words: 2005

Research Paper

Politics of Difference and the Case of School Uniforms, Research Paper Example

Introduction In Samantha Deane’s article “Dressing Diversity: Politics of Difference and the Case of School Uniforms” and the Los Angeles Unified School District’s policy on [...]

Pages: 2

Words: 631

Research Paper

The Risk of Teenagers Smoking, Research Paper Example

Introduction Smoking is a significant public health concern in the United States, with millions of people affected by the harmful effects of tobacco use. Although, [...]

Pages: 11

Words: 3102

Research Paper

Impacts on Patients and Healthcare Workers in Canada, Research Paper Example

Introduction SDOH refers to an individual’s health and finances. These include social and economic status, schooling, career prospects, housing, health care, and the physical and [...]

Pages: 7

Words: 1839

Research Paper

Death by Neurological Criteria, Research Paper Example

Ethical Dilemmas in Brain Death Brain death versus actual death- where do we draw the line? The end-of-life issue reflects the complicated ethical considerations in [...]

Pages: 7

Words: 2028

Research Paper

Ethical Considerations in End-Of-Life Care, Research Paper Example

Ethical Dilemmas in Brain Death Ethical dilemmas often arise in the treatments involving children on whether to administer certain medications or to withdraw some treatments. [...]

Pages: 5

Words: 1391

Research Paper

Ethical Dilemmas in Brain Death, Research Paper Example

Brain death versus actual death- where do we draw the line? The end-of-life issue reflects the complicated ethical considerations in healthcare and emphasizes the need [...]

Pages: 7

Words: 2005

Research Paper

Politics of Difference and the Case of School Uniforms, Research Paper Example

Introduction In Samantha Deane’s article “Dressing Diversity: Politics of Difference and the Case of School Uniforms” and the Los Angeles Unified School District’s policy on [...]

Pages: 2

Words: 631

Research Paper