Tuesday, October 15, 2019

Connectivity and security Issues Research Paper

Connectivity and security Issues - Research Paper Example In order to conduct a successful assessment, having a positive impact on the security posture of a system on the entire organization, elements of the examination must maintain the technical procedure. The testing process enables organizations to develop a policy of information security assessment and methodology. Identification of individual roles, related to technical procedures is also the aspects of the assessment. Description Corporate organizations spent an enormous amount of money for securing the computer networks and valuable data. There are many techniques and methods introduced in the past for protecting networks. Several encryption techniques are injected between the data flow from one network to another. Organizations prefer technology with low cost and high efficiency, providing network protection and security internally and externally. Evaluation and testing of networks is an essential activity for measuring the current security mechanism. This testing activity identifi es the probability of potential threats as well as threats already available within the network. For eliminating the potential and existing threats, Dial in RAS security testing is implemented. What is Remote Access Server (RAS)? A clear definition is available in the computer desktop encyclopedia which says â€Å"A computer in a network that provides access to remote users via an Internet or dial-up connection†. Many organizations are saving money by providing access to networks from home. The executives, sales staff and others need to connect to the organization’s network when they in mobile resources and need to access network resources also on the weekends from home. RAS initiates remote access techniques for vulnerabilities, they cover computing servers such as terminal servers, VPNs, secure shell (SSH) tunnels, remote desktop application, and dial-up modems. The alternative methods are adapted in this testing procedure for entering in circumvents perimeter defens es. Remote access testing also follows penetration testing methodology, but can also be executed separately to focus on remote access implementations. Testing techniques differ from type of remote access services being tested and the specific goals of the test. Benefits Information security assessment enables the organization to evaluate and test the network, hosts, system, procedure, and person. The organization will able to eliminate essential process by the following methodologies conducted by the RAS server testing: Unauthorized remote access services Port scanning will locate open ports that are often associated with remote access services. Systems are manually checked for remote access services by viewing running processes and installed applications. Evaluating rules for remote access paths Rules sets which are applied on Virtual private network gateways are reviewed for holes or miss configurations that could authorize unwanted entrance for hackers. RAS authentication mechani sm The remote access methods normally require authentication. Before testing, the testing team or testers will first authorize themselves in to the authentication system. There are some defaults or extra account available for testing purpose. Brute force attack is initiated for getting in to the network or gain access without an authentication token. Social engineering techniques are used for breaking the

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.