A service allowing users to connect to their local network by telephone. When users try to connect remotely, they dial a remote-access server on the network and are thereby given access. To gain access, the request needs to be consistent with the server’s remote access policies, the account needs to be approved for remote access, and the user-server authentication needs to be successful.
After users are authorized, their access to the network might be limited to specific servers, subnets, or protocol types, depending on the users’ profiles. Services typically available to users connected to a local area network—file and print sharing, Web access, and messaging—are similarly available to users through remote access connection.
Crackers are drawn to poorly configured remote access points, for often they provide an open door into the network—and crackers do not have to worry about security devices at the Internet border. The reality is that although most networks have remote access points, the majority of these do not have enough security.
Firms such as Sun Microsystems, Inc., which acquired remote-access software maker Tarantella, Inc. for about $25 million in May 2005, build software programs allowing organizations to access and manage their information and applications across all platforms, networks, and devices.
Habersetzer, V. Thwarting Hacker Techniques: Securing Remote Access Points. [Online, February 25, 2005.] TechTarget Website. http://www.searchSecurity.com/tip/ 1,289483,sid14_gci1062436,00.html?track+NL-358&ad=506214; In Brief. Sun Acquiring Maker of Remote Access Software. The Globe and Mail, May 12, 2005, p. B8; Microsoft Corporation. Planning Distributed Security. [Online, 2001.] Microsoft Corporation Website. http://www.microsoft.com/windows2000/techinfo/reskit/en-us/default.asp?url=/windows2000/ techinfo/reskit/en-us/deploy/dgbe_sec_xqlf.asp.