Verified Document

Remote Access Computer Networks The Thesis

The Rising Importance of Remote Access Computer Networks in Business

Naturally, one of the advantages of using remote computer access networks for presentations, conferences, and staff training is the tremendous cost savings of reducing the travel that was necessary for traditional formats of those essential business functions. The modern era of business globalization only increases the value of that aspect of remote computer access networks, by virtue of the corresponding greater need for business travel and the necessary establishment of business operations in different national and international regions. Similarly, the rising focus on green concerns has increased the importance of reducing unnecessary business travel in connection with addressing the fossil fuel consumption and carbon emissions issues that are becoming more and more of a national an international concern.

In that regard especially, remote computer access networks make possible the expansion of teleworking throughout modern business (Huang & Frahim, 2008 p112). It is now anticipated that in the next decade, the next phase pf business processes evolution will emphasize remote teleworking whereby more and more business employees will work from their homes instead of commuting to an office.

Already, many employers in both the private sector and government have begun implementing flexible teleworking schedules to allow certain employees to work from home part of the time. As telework becomes more and more common, it will substantially reduce traffic congestion in major cities, wear and tear on roads and infrastructure, as well as enable meaningful reductions in reliance on fossil fuels and corresponding carbon emissions. Employers will also be able to greatly reduce overhead costs associated with maintaining large office facilities for those employees whose responsibilities can be performed remotely from home via remote access computer networks.

Security Considerations and Strategies

As with other aspects of modern business computing, data security and system access controls are extremely important. In that regard, the conduct of business through remote access networks could potentially increase vulnerability to malicious infiltration. Whereas traditional means of gaining unauthorized access to secure business computer networks typically...

In principle, RASCs can ensure the security of remote access computer networks through vigilant implementation of up-to-date encryption software on both ends of transmissions, access controls sufficient to prevent unauthorized access, and continual upgrades of systems, software, and security protocols (including appropriate staff training). Provided those mechanisms are properly implemented, remote access computer networks can be used as safely as traditional hard-wired computer networks (Business Wire, 2003; Newman, 2009 p228).
Conclusion

Remote access computer networks have already substantially changed the way that computers are used throughout American society. That is particularly true in the case of professional business computer applications. Already, many private-sector and government entities have begun relying on remote access computer networks for standard business computing functions.

Some of the most important capabilities in that regard pertain to the manner in which emote access computer networks permit multiple users to share files and applications, business presentations, and conferencing without requiring users to be in the same location. Similarly, remote access computer networks now allow staff training to be conducted remotely. Finally, it is anticipated that within the next decade, remote access computer networks will allow tremendous growth in teleworking which is likely to radically change the way much of ordinary professional business is conducted.

Works Consulted

"Remote Access Security Center Announced by Positive Networks." Business Wire.

Business Wire. 2003. HighBeam Research. 19 Dec. 2009 .

Qiang Huang, and Jazib Frahim. SSL Remote Access VPNs. 2008. Cisco Publishing.

Robert Newman. Computer Security: Protecting Digital Resources. 2009. Jones & Bartlett Publishers.

Sources used in this document:
Resources. 2009. Jones & Bartlett Publishers.
Cite this Document:
Copy Bibliography Citation

Related Documents

Remote Access Attacks Quick Finance Company Network Diagram
Words: 936 Length: 3 Document Type: Essay

Remote Access Analyze the Quick Finance Company Network Diagram and describe the assumptions you will need to make in order to identify vulnerabilities and recommend mitigation techniques as there is no further information from this company. The company does not wish to release any security related information per company policy. The basic assumptions that must be made include: a lack of effective monitoring / coordination, the inability to deal with problems and

Computer Network Security Issues Computer
Words: 1894 Length: 6 Document Type: Research Paper

In some instances, policies implemented mainly as cost-effective shortcuts to network system security have cost otherwise good employees their jobs for violations of excessively restrictive network use policies. In the realm of the home computer user, it is possible to buy many new redundant or unnecessary security programs and features. Generally, appropriate network security should not interfere noticeably with either personal home computer use or computer system use in

Remote Access to a School Network
Words: 506 Length: 2 Document Type: Essay

network I am on is a relatively typical one, taking into account that it involves a series of computers being connected to the network via a login server, an address server, a file server, and a remote access server. All of these are protected by a firewall and then connect directly to the internet. The firewall is designed to prevent attacks from reaching various locations on the network. Protection

Wireless Computing Technology, E.G., Remote Access to
Words: 849 Length: 2 Document Type: Term Paper

wireless computing technology, e.g., remote access to the company or corporate network creates many benefits for an enterprise, such as increased mobility and flexibility, but anonymity almost always also makes a network vulnerable. An intruder might attack from thousands of miles away and never come into direct contact with the system, its administrators or users (Pfleeger and Pfleeger, 2007, p. 397). Therefore authentication, e.g., a process of determining that a

Access Control Types of Access
Words: 1816 Length: 7 Document Type: Term Paper

These certificates are issued by the certification authorities (CAs) and they contain the name, expiration dates as well as serial numbers of the certificates. OS Hardening Operating system hardening is the process of addressing the various security issues and vulnerabilities in a given operating system via the implementation of the latest Operating system patches, updates, hotfixes as well procedures and policies that are necessary for reducing the number of attacks as well

Network Design Network ABC Network Design a
Words: 3772 Length: 12 Document Type: Essay

Network Design Network ABC NETWORK DESIGN A Comprehensive Proposal and Design for ABC Inc. Network Requirements Network Proposal Overview Telecommunication Overview Telecommunication Proposal Network Configuration Management Plan In order to meet the needs of the customers, ABC Inc. must insure that productivity is not hindered by the growth of the company. The employees at ABC Inc. must have a robust network so that customer service is not jeopardized. The accounting firm has grown from five to fifty employees

Sign Up for Unlimited Study Help

Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.

Get Started Now