Page 884 - (ISC)² CISSP Certified Information Systems Security Professional Official Study Guide
P. 884
Telecommuting is performing work at a remote location (i.e., other
than the primary office). In fact, there is a good chance that you
perform some form of telecommuting as part of your current job.
Telecommuting clients use many remote access techniques to
establish connectivity to the central office LAN. There are four
main types of remote access techniques:
Service Specific Service-specific remote access gives users the
ability to remotely connect to and manipulate or interact with a
single service, such as email.
Remote Control Remote-control remote access grants a remote
user the ability to fully control another system that is physically
distant from them. The monitor and keyboard act as if they are
directly connected to the remote system.
Screen Scraper/Scraping This term can be used in two
different circumstances. First, it is sometimes used to refer to
remote control, remote access, or remote desktop services. These
services are also called virtual applications or virtual desktops. The
idea is that the screen on the target machine is scraped and shown
to the remote operator. Since remote access to resources presents
additional risks of disclosure or compromise during the distance
transmission, it is important to employ encrypted screen scraper
solutions.
Second, screen scraping is a technology that can allow an
automated tool to interact with a human interface. For example,
some stand-alone data-gathering tools use search engines in their
operation. However, most search engines must be used through
their normal web interface. For example, Google requires that all
searches be performed through a Google web search form field. (In
the past, Google offered an API that enabled products to interact
with the backend directly. However, Google terminated this
practice to support the integration of advertisements with search
results.) Screen-scraping technology can interact with the human-
friendly designed web front end to the search engine and then
parse the web page results to extract just the relevant information.
SiteDigger from Foundstone/McAfee is a great example of this type

