Page 885 - (ISC)² CISSP Certified Information Systems Security Professional Official Study Guide
P. 885
of product.
Remote Node Operation Remote node operation is just another
name for dial-up connectivity. A remote system connects to a
remote access server. That server provides the remote client with
network services and possible internet access.
POTS and PSTN refer to traditional landline telephone connections.
POTS/PSTN connections were the only or primary remote network
links for many businesses until high-speed, cost-effective, and
ubiquitous access methods were available. POTS/PSTN also waned in
use for home-user internet connectivity once broadband and wireless
services became more widely available. POTS/PSTN connections are
sometimes still used as a backup option for remote connections when
broadband solutions fail, as rural internet and remote connections,
and as standard voice lines when ISDN, VoIP, or broadband solutions
are unavailable or not cost effective.
When remote access capabilities are deployed in any environment,
security must be considered and implemented to provide protection
for your private network against remote access complications:
Remote access users should be stringently authenticated before
being granted access.
Only those users who specifically need remote access for their
assigned work tasks should be granted permission to establish
remote connections.
All remote communications should be protected from interception
and eavesdropping. This usually requires an encryption solution
that provides strong protection for the authentication traffic as well
as all data transmission.
It is important to establish secure communication channels before
initiating the transmission of sensitive, valuable, or personal
information. Remote access can pose several potential security
concerns if not protected and monitored sufficiently:
If anyone with a remote connection can attempt to breach the
security of your organization, the benefits of physical security are

