Preview

remote access it255

Satisfactory Essays
Open Document
Open Document
345 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
remote access it255
Write a remote access security policy covering the most important security risk.

1) Wireless Access
When the network is accessed remotely via wireless appropriate wireless security standards will be used.
• Wired Equivalency Protocol (WEP) will be used as standard on Wi-Fi connections. • A WEP encryption key will be used.
• The network will be configured not to advertise its presence.
• The power of access points will be turned down to a minimum that still allows the access point to function.
• Due to the possibility of cracking Wireless Encryption Protocol using sniffing software such as AirSnort all wireless access points will be outside the firewall. • Wi-Fi Protected Access (WPA) will be used where it is available.
2) Secure Access via VPN
Access from remote users to the corporate network will be via secure IPSEC VPN or SSL VPN connections only. This is necessary to secure the connection from the remote device to the corporate network.
3) Prevention of Data Loss
All laptops and PDA’s that are taken off site will have the following security configured, to prevent data loss in the event of theft.
• The hardware password will be enabled if available.
• All corporate data on the laptop or PDA will be encrypted using appropriate encryption software.
• Sensitive documents will be accessed remotely and not downloaded to the laptop or PDA.
4) Remote Device Protection
To prevent remote PC’s, laptops, PDA’s etc from compromising the corporate network, security software will be installed on the devices.
• Firewall software will be installed on the devices to prevent them from being compromised by trojans and back door software.
• Anti-virus software configured to automatically download the latest virus signatures will be installed and utilised.
5) Blue Tooth
To prevent Bluetooth enabled devices from being attacked and compromised the
Bluetooth connections on mobile phones, PDA’s and laptops will be disabled

You May Also Find These Documents Helpful

  • Satisfactory Essays

    Week 5 6 ILAB SriLakshmi

    • 773 Words
    • 3 Pages

    I believe having 1 node or just a few nodes would be accessing this access point. With dropping the power output will help increase stability if there is a lot of interference with outside noise. This node might not need the extra performance or the extra distance a higher transmit power would generate.…

    • 773 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    In North America, 802.11a channels should be restricted to 1, 6, and 11 to reduce channel overlaps.…

    • 2145 Words
    • 9 Pages
    Good Essays
  • Good Essays

    It242 Week 2 (Oce) Voip

    • 760 Words
    • 4 Pages

    Dialogic is a Canadian business solutions company which conducted a case study regarding Oregon Corrections Enterprises’ (OCE). OCE is a correctional institute focused on rehabilitating prisoners by vocational training; meanwhile, it provides inmates with a work environment, which helps facilitate an inmate back into society. OCE’s decision to change from a TDM Hardware-based call center to a less expensive VoIP (Voice over Internet Protocol) solution has been extremely beneficial and has enabled OCE to not only save money, but expand its call center (where inmates work) without creating additional expenses. More importantly, the alternative also needed to uphold all of Oregon’s telecommunication compliances for prisons and inmates, CBX’s software have accomplished this need.…

    • 760 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    nt1210 lab 7.1-3

    • 420 Words
    • 3 Pages

    2. It’s because the signal still has to be able to be picked up by the AP it would have to depend on the router to pick up the signal…

    • 420 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    Chapter 20 WOS review

    • 512 Words
    • 3 Pages

    A setting called airplane mode lowers the output power of the Wi-Fi and Bluetooth antennas allowing these networks to function, but at a reduced range?…

    • 512 Words
    • 3 Pages
    Good Essays
  • Good Essays

    It250

    • 272 Words
    • 2 Pages

    Which of the following symbols instructs the shell to redirect the output of a command to the specified file instead of the screen and overwrite the file?…

    • 272 Words
    • 2 Pages
    Good Essays
  • Good Essays

    wideband wireless access, and shrinking out of unallocated spectrum. Studies indicate that, at any given time and location, there…

    • 8009 Words
    • 33 Pages
    Good Essays
  • Better Essays

    The first line of defense for almost every organization is typically the system administrator. This is the person that actively interacts with the company network on a daily basis, and by extension has intimate knowledge of it. So it stands to reason that this person would hopefully be the first to notice any signs of possible compromise would it not? Sadly that is often not the case. Whether it is due to a lack of IT Training, complacency, or laziness is anyone’s guess.…

    • 1839 Words
    • 8 Pages
    Better Essays
  • Good Essays

    It244 Access Control

    • 648 Words
    • 3 Pages

    Describe how and why discretionary access control will be used. Include an explanation of how the principle of least privilege applies to assure confidentiality. Explain who the information owner is that has the responsibility for the information and has the discretion to dictate access to that information.…

    • 648 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    IT 230 - Computer Networking

    • 5978 Words
    • 24 Pages

    c. Where cabling is to be enclosed in a solid wall, the cables should be installed…

    • 5978 Words
    • 24 Pages
    Powerful Essays
  • Satisfactory Essays

    wireshark

    • 452 Words
    • 3 Pages

    Another area of interest was the information that is transmitted to the access points themselves. Understanding…

    • 452 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    and open wireless networks. It also explains that open wireless networks are likely to be…

    • 419 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Samsung Strategy Map

    • 250 Words
    • 1 Page

    |Communication and Networking » »» » » » » |Access network architecture, security, radio air interface |…

    • 250 Words
    • 1 Page
    Satisfactory Essays
  • Good Essays

    You should know my friend that in each wireless network there is one or more access points. It is a device that allows wireless devices to…

    • 586 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    light fidelity

    • 2079 Words
    • 9 Pages

    system is constantly expanding. Due to this, Radio spectrum is getting clogged day by day and demand for wireless…

    • 2079 Words
    • 9 Pages
    Powerful Essays