Page 885 - (ISC)² CISSP Certified Information Systems Security Professional Official Study Guide
P. 885

of product.

                  Remote Node Operation Remote node operation is just another
                  name for dial-up connectivity. A remote system connects to a

                  remote access server. That server provides the remote client with
                  network services and possible internet access.



               POTS and PSTN refer to traditional landline telephone connections.
               POTS/PSTN connections were the only or primary remote network
               links for many businesses until high-speed, cost-effective, and
               ubiquitous access methods were available. POTS/PSTN also waned in
               use for home-user internet connectivity once broadband and wireless
               services became more widely available. POTS/PSTN connections are

               sometimes still used as a backup option for remote connections when
               broadband solutions fail, as rural internet and remote connections,
               and as standard voice lines when ISDN, VoIP, or broadband solutions
               are unavailable or not cost effective.

               When remote access capabilities are deployed in any environment,
               security must be considered and implemented to provide protection
               for your private network against remote access complications:


                    Remote access users should be stringently authenticated before
                    being granted access.

                    Only those users who specifically need remote access for their
                    assigned work tasks should be granted permission to establish
                    remote connections.

                    All remote communications should be protected from interception
                    and eavesdropping. This usually requires an encryption solution

                    that provides strong protection for the authentication traffic as well
                    as all data transmission.

               It is important to establish secure communication channels before
               initiating the transmission of sensitive, valuable, or personal
               information. Remote access can pose several potential security
               concerns if not protected and monitored sufficiently:

                    If anyone with a remote connection can attempt to breach the

                    security of your organization, the benefits of physical security are
   880   881   882   883   884   885   886   887   888   889   890