Page 883 - (ISC)² CISSP Certified Information Systems Security Professional Official Study Guide
P. 883
Remote Access Security Management
Telecommuting, or working remotely, has become a common feature
of business computing. Telecommuting usually requires remote
access, the ability of a distant client to establish a communication
session with a network. Remote access can take the following forms
(among others):
Using a modem to dial up directly to a remote access server
Connecting to a network over the internet through a VPN
Connecting to a terminal server system through a thin-client
connection
Connecting to an office-located personal computer (PC) using a
remote desktop service, such as Microsoft’s Remote Desktop,
TeamViewer, GoToMyPC, Citirx’s XenDesktop, or VNC
Using cloud-based desktop solutions, such as Amazon’s
Workspaces
The first two examples use fully capable clients. They establish
connections just as if they were directly connected to the local area
network (LAN). In the last example, all computing activities occur on
the terminal server system rather than on the distant client.
Telephony is the collection of methods by which telephone services are
provided to an organization or the mechanisms by which an
organization uses telephone services for either voice and/or data
communications. Traditionally, telephony included plain old
telephone service (POTS)—also called public switched telephone
network (PSTN)—combined with modems. However, private branch
exchange (PBX), VoIP, and VPNs are commonly used for telephone
communications as well.
Remote Access and Telecommuting Techniques

