Remote Access By Matthew Benack Karen L. Paullet ISSC481 IT Security Planning and Policy February 20, 2011 Remote Access Nowadays, computers are a part of everything that people use. We use them for news, communication, find information, online education, banking transactions and working on a computer in the office from across the world. Time and money are always issues in business so when things go wrong with technology or your computer how does it get fixed? This can be a problem especially if you are away from home or the office.
The days of computer technicians being paid to fly cross country or around the world for three days to fix computers are obsolete. This has been replaced by remote computer support or remote access. Giving a person access to your computer from outside network can make a person uneasy. The best way to ease that uncertainty is to learn about the technology and understand it. Remote access is a way for users and IT support to access a computer or network from a distant place away from the home server.
This can also be used to make use of any resources like stored data or programs that might not be available on the computer that you are using. Most corporations that have employees that work from remote locations or work from home use some type of remote access. This is a valuable asset to the company because it does not always have to have a paid employee at the location to get the work done. With computers becoming a more common place item in business the benefits of using remote access keep on growing.
Many benefits of remote access have only become more prevalent as the stability and speeds of the Internet have improved and increased in the past five years. The first thing that comes to mind as a benefit is the essential software used by companies such as the Microsoft Office Suite or the Adobe Acrobat Suite. These are major players in the business world and are not cheap if you were to have to buy a copy every time. Sage Accounts and Microsoft Dynamics CRM are a couple of other programs that are used by remote access.
Use of Secure E-Mail thru Microsoft Exchange server email is a large one that business professionals use while on the road. Use your hosted desktop anywhere in the world with an internet connection and computer. Everyone hates to lose data, remote access provides a housed secure data center and provides encrypted signal both up and down to the server keeping prying eyes away from the data. Remote CRM hosting is also largely used by business professionals on the road increasing customer retention and sales all over the world. Finally the one that everyone likes to hear and see, the bottom line and cost-savings.
Some major cost saving comes from businesses not needing to purchase Adobe Acrobat Suite software in multiple copies. Another that is really great is Microsoft Office suite usually comes included with remote IT system setup. This all sounds great and can do many things for the business but there are risks. On top of the growing list of risks that have already been addressed in the security of the network like: malware, spam, DoS attacks, USB devices, web-based email and so on, along comes this cool thing called remote access.
When the company trusts a person with remote access privileges this is done with limited knowledge about the network being used to connect to the company network. If a remote connection is made with the company network on a company provided computer, but the home network being used is not secured properly then you have opened a potential door for access to the company. This would also apply to a trusted connection to a supplier that has a “trusted connection” with another company that is not secured and is infected with a worm; you have now become a victim of the same worm because of this connection.
The potential for unsecured connections, even though the connection to the office network is secure, is an endless list. Lets add another variable like laptop theft, which is on the rise in corporate America. What better way for a hacker to gain access than thru a workstation already setup because the employee that was given remote access set the laptop to remember login information. So ask yourself is remote access really needed for that executive just to allow them to work from home? The benefit of comfort for one could have devastating effects on the company as a whole.
If you have chosen to allow this then one must know what is involved with remote access. Everyone knows that in the end most things in business come down to cost of start-up, and maintaining the system after that. Let’s start with pcAnywhere, one of the first of its kind that allowed cross-platform capabilities that allowed Windows, Mac and Linux systems to access one another’s servers. Then came VNC that allowed keyboard and mouse events from computer to computer. Not sure the cost was the issue for the failure more than the ability of these systems to be hacked.
Since these two hit the market there has been a large number of these pop up to try and take their share of the market each with advantages and disadvantages and Each with their own idea of how to charge as well. PcAnywhere is still around and charges $99 to $199 depending on the options that are chosen (Symantec. com, 2011). Next is Timbuktu that runs $89. 95 for one computer to $1,599. 95 for a thirty pack (netopia. com). Then comes LapLink Four that cost $49. 95 for one user of for a three pack $99. 95 you get access to multiple computers (laplink. om). Finally there is GoToMyPC which offers standard, pro and corporate. Standard is $99 a year, Pro is 198 a year which is for 1 admin and 2 – 50 computers and then corporate which requires contacting the company for pricing. The use of these remote access programs allows a lot of flexibility but security is a big concern with companies now days. Computers, no matter how they are connected to a network, are at risk. Privacy and security concerns will always arise the best you can hope for is to control it.
Some things that will minimize and help control the use of remote access are: * Expect hostile threats will occur (laptop theft, data interception). * Develop policy defining telework, remote access. * Configure remote access servers to enforce the policies. * Secure client devices against common known threats. * Employ and enforce strong encryption and user authentication Each one of these might seem inconvenience but when using remote access security should outweigh convenience (Chabrow, 2009). Remote access can help business professionals conduct their daily business nd stay connected to the home office but at what price? Businesses need to look closely at how much the remote access is needed because it does keep IT professionals very busy trying to secure the connection and maintain privacy. Does the benefit outweigh the risk and if so how much risk is the company willing to take? These are questions only the IT staff and executives of the business can answer. References: Bradley, T. (2011) The Secret Passage. Retrieved on February 19, 2011 at: http://netsecurity. about. com/od/perimetersecurity/a/aa060304. htm Chabrow, E. 2009) 5 Steps to Secure Remote Access Retrieved on February 18, 2011 at: http://www. govinfosecurity. com/articles. php? art_id=1247&pg=2 King, C. (2010). Everything You Need to Know About Remote Computer Support. Retrieved on January 16, 2011 at: http://computeruser. com/articles/everything-you-need-to-know-about-remote-computer-support. html Smith, L. (). What Are the Benefits of Remote Accesss and Hosted Desktop IT Systems? Retrieved on February 19, 2011 at: http://ezinearticles. com/? What-Are-the-Benefits-of-Remote-Access-and-Hosted-Desktop-IT-Systems? amp;id=1318909 Tatum, M. (2010). What Is Remote Access? Retrieved on February 19, 2011 at: http://www. wisegeek. com/what-is-remote-access. htm Unknown. (2011). Compare Plans Retrieved on February 18, 2011 at: http://www. gotomypc. com/remote_access/remote_desktop Unknown. (2011). LapLink Everywhere Retrieved on February 19, 2011 at: http://www. laplink. com/lle5/pricing. html Vamosi, R. (2003). The Dangers of Remote PC Access Retrieved on January 16, 2011 at: http://reviews. cnet. com/4520-3513_7-5053016-1. html
Details for nursing students Medication safety is an integral part of nursing and midwifery best practice
Details for nursing students Medication safety is an integral part of nursing and midwifery best practice.
Step 1: Read the details given. Details for nursing students Medication safety is an integral part of nursing and midwifery best practice. Measures are undertaken to improve the safety and quality of medication administration. Despite these measures medication errors are identified as frequent yet preventable health care errors. You are provided with two research articles related to medication safety – one based on a research study using a quantitative method and the other using a qualitative method. Read both articles available. Nursing: Qualitative study article Nurses’ experiences and perspectives on medication saftey practices: an explorative qualitative study (Smeulers, Onderwater, van Zwieten and Vermeulen, 2014) https://onlinelibrary-wiley-com.ezproxy.uws.edu.au/doi/full/10.1111/jonm.12225 Nursing: Quantitative study article Exploring the influence of workplace supports and relationships on safe medication practice: A pilot study of Australian graduate nurses (Sahay, Hutchinson and East, 2015) https://www-clinicalkey-com-au.ezproxy.uws.edu.au/nursing/#!/content/playContent/1-s2.0- S026069171500043X?returnurl=null&referrer=null Step 2: Guided questions Once you have read your qualitative and quantitative study articles you are required to use the Guided questions answer template (DOC 25 KB)Preview the document to write 1500 words responding to the guided questions listed below. It is important to note that the template is designed to allow you to respond to the questions for both research articles clearly and individually. Guided questions Significance and aim (200 words) (100 words per research study article) What is the aim and significance of the study? Methods (700 words) (350 words per research study article) Identify the research design used in the study and describe the main characteristics of the identified research design Discuss the sampling technique, inclusion and exclusion criteria used for the selection of sample in the study Explore the data collection method and its appropriateness to the research design of the study Data analysis and results (600 words) (300 words per research study article) How was the data analysed and was it appropriate for the study? What were the findings/results of the study? Discuss the limitations and recommendations of the study? Important word count information: There is a word limit of 1500 words (excluding the guided questions) for this assignment.
Use your computer to total the number of words used in your assignment. However, do not include the reference list at the end of your assignment in the word count. In-text citations will be included in the additional 10% word count. If you exceed the word limit by more than 10% the marker will stop marking at 1500 words plus 10%. Step 3: Completing your guided review When completing your 1500–word guided review of your two research study articles it is important that you comply with the following: Respond to each of the questions provided in the guide for analysis using academic writing. It is anticipated that your work will be presented in a question/answer format using full sentences and paragraphs. Type your responses on the Guide questions answer template (DOC 25 KB). Use a minimum of three (3) recent academic references to demonstrate your understanding. The academic references you use must not be published earlier than 2014. Referencing must be presented using APA 6th ed. style (Links to an external site.) (Western Sydney U Lib 2018). Submit your completed Guide questions answer template via the submission point. Important note: Carefully review the marking criteria and standards. They are designed to give guidance regarding the level of understanding of research reporting needed to identify, describe and discuss the various features of the nominated articles for review and to achieve the marks allocated.
Essay Help “>Essay Help