part a discussion in networking part b responses to your peers

Part A:::
When you are looking at remote access to a networked computer or device, what considerations and issues should be evaluated? For example, would you evaluate computer configuration and security?

Identify three considerations and/or issues related to remote access to a networked device, and frame your response in one to two paragraphs.

Part B:::

In your responses to your peers, discuss any personal experiences or concerns you might have with someone accessing your computer or system remotely. Response to two post separately.

Post 1: There are a few things you would want to take into consideration when dealing with remote access to computers or devices. The main thing you want to consider is how strong of security you should have. Depending on what you will be doing and how sensitive the information is you might want to get stronger security. This will make it harder for someone to access you information. A second thing you would want to consider is permissions on your computer. If someone is attempting to access you information on your device they wont be able to get into it without the correct permissions. Third you should consider whether the device you will be connecting to is trustworthy or not. If it is an unknown device you could be left more vulnerable to hackers.

Post 2: Considering I have been working in Support for law firms for the past 4 years, I have come across many concerns and issues with remote access to a network. The biggest issues I’ve noticed with remote access are reliability, security and setup.

I could write an entire paper on issues and concerns with reliability that I have come across using RDP, remote Citrix servers and VPN networks. Even though you cannot control everything with a remote user’s setup it is your job to make your remote network as reliable as possible when facing factors like the individuals network provider, connection speed, physical location, devices they will use for connection and etc. Some great ideas would be to focus on getting the best performance on the lowest possible requirements so when you come in contact with factors that you cannot control you have a better probability of their connection being completely stable. When it comes to focusing on things you can control you need to make sure your servers are redundant so data will not be lost and take in consideration for lag based on a remote user’s location. I’ve seen multiple Citrix environments that had multiple servers running to handle all the traffic that would come in and ensure that each user felt like they were working on a computer in the office even though it could handle up to 300+ users at a time. Reaching stable environments for remote work is one of your top priorities considering no one will use it if it’s not reliable. Security is an obvious must considering your remote network needs to be more secure than your internal network since these connections are coming from outside sources. Whether you are using RDP, Citrix environments or VPN you need to make sure your security is in place so that they cannot be breached and effect your internal network. Firewalls, blocking certain ports, more advanced security protocols and encrypted have to be doubled down on to make sure when a user’s outside network interfaces and relies the information over to your network nothing from there end that is harmful can get through. Software to monitor all traffic is always necessary as well since it’s not enough to keep stuff out but you also have to make sure the users on your network are not going to inappropriate sites or activating hazardous software while already on the network since breaches can happen in multiple ways now a days. 2 factor authentication and other ways to confirm that a user is who they claim to be can help make sure that you are safe but it will only take you so far even if implemented correctly.

"Order a similar paper and get 100% plagiarism free, professional written paper now!"