A service allowing users to connect to their
local network by telephone. When users try to connect remotely, they dial a
remote-access server on the network and are thereby given access. To gain
access, the request needs to be consistent with the serverÂ’s remote access
policies, the account needs to be approved for remote access, and the
user-server authentication needs to be successful.
After users are authorized, their access to the network
might be limited to specific servers, subnets, or protocol types, depending on
the usersÂ’ profiles. Services typically available to users connected to a local
area networkÂ—file and print sharing, Web access, and messagingÂ—are similarly
available to users through remote access connection.
Crackers are drawn to poorly configured remote access
points, for often they provide an open door into the networkÂ—and crackers do
not have to worry about security devices at the Internet border. The reality is
that although most networks have remote access points, the majority of these do
not have enough security.
Firms such as Sun Microsystems, Inc., which acquired
remote-access software maker Tarantella, Inc. for about $25 million in May
2005, build software programs allowing organizations to access and manage their
information and applications across all platforms, networks, and devices.
Authentication; File and Print Sharing; Local Area Network (LAN); Network;
Out-of-Band Management; Protocol.
V. Thwarting Hacker Techniques: Securing Remote Access Points. [Online, February 25, 2005.] TechTarget
1,289483,sid14_gci1062436,00.html?track+NL-358&ad=506214; In Brief. Sun
Acquiring Maker of Remote Access Software. The
Globe and Mail, May 12, 2005, p. B8; Microsoft Corporation. Planning Distributed Security.
[Online, 2001.] Microsoft Corporation Website.