blog




  • Essay / Remote Access Attacks - 1331

    IntroductionRemote access can be clearly defined as the ability of an individual to access a computer or network from a remote location. Today, many business people who travel often need to have remote access to their company's network. There are, however, vulnerabilities common to all types of remote access, and regardless of the method used, the endpoint machine is vulnerable like all other systems with access to the Internet. Any time a system is accessed via the Internet, that system is exposed to danger. Analyze the Quick Finance company network diagram and describe the assumptions you will need to make in order to identify vulnerabilities and recommend mitigation techniques as there is no other information from this company. There are elements that constitute road maps that lead to system vulnerabilities: all systems contain some sort of vulnerability, faulty systems are accessible via the Internet, and hackers have knowledge of system vulnerabilities and have access to them. one way or another. The Quick Finance company's network diagram shows that some of the vulnerabilities I mentioned earlier may exist in their network. So I can assume that there are system vulnerabilities, given that the company's web server was degraded twice in a month, they suffered denial of service (DOS) attacks, and their server VPN has already been hacked. I can also assume that they have weak administrative controls and/or security procedures. A plan must be in place to manage administrative controls and/or security procedures, to create, replace or improve current controls and procedures. I can also assume that there are some hardware and software vulnerabilities. ...... middle of paper ...... is likely to occur in any network: ranked #1 would be some kind of socially engineered Trojan horse, ranked #2 would be an attack of l man in the middle, and ranking #3 would be a denial of service attack. There are, however, vulnerabilities common to all types of remote access, and regardless of the method used, the endpoint machine is vulnerable like every other system with access to the Internet. Works Cited Farrow, R. (nd), Network defense, Accessed February 28, 2014 http://www.rikfarrow.com/Network/net0402.html Grimes, R. (2012.), The 5 cyberattacks you are most susceptible to to face, Accessed February 28, 2014. 2014 at http://www.infoworld.com/d/security/the-5-cyber-attacks-youre-most-likely-face-208361Tosch Production. (2012), Mitm 8: Countermeasures, accessed February 28, 2014 http://toschprod.wordpress.com/2012/03/04/mitm-8-countermeasures/