Verified Document

Remote Access Computer Networks The Thesis

The Rising Importance of Remote Access Computer Networks in Business

Naturally, one of the advantages of using remote computer access networks for presentations, conferences, and staff training is the tremendous cost savings of reducing the travel that was necessary for traditional formats of those essential business functions. The modern era of business globalization only increases the value of that aspect of remote computer access networks, by virtue of the corresponding greater need for business travel and the necessary establishment of business operations in different national and international regions. Similarly, the rising focus on green concerns has increased the importance of reducing unnecessary business travel in connection with addressing the fossil fuel consumption and carbon emissions issues that are becoming more and more of a national an international concern.

In that regard especially, remote computer access networks make possible the expansion of teleworking throughout modern business (Huang & Frahim, 2008 p112). It is now anticipated that in the next decade, the next phase pf business processes evolution will emphasize remote teleworking whereby more and more business employees will work from their homes instead of commuting to an office.

Already, many employers in both the private sector and government have begun implementing flexible teleworking schedules to allow certain employees to work from home part of the time. As telework becomes more and more common, it will substantially reduce traffic congestion in major cities, wear and tear on roads and infrastructure, as well as enable meaningful reductions in reliance on fossil fuels and corresponding carbon emissions. Employers will also be able to greatly reduce overhead costs associated with maintaining large office facilities for those employees whose responsibilities can be performed remotely from home via remote access computer networks.

Security Considerations and Strategies

As with other aspects of modern business computing, data security and system access controls are extremely important. In that regard, the conduct of business through remote access networks could potentially increase vulnerability to malicious infiltration. Whereas traditional means of gaining unauthorized access to secure business computer networks typically...

In principle, RASCs can ensure the security of remote access computer networks through vigilant implementation of up-to-date encryption software on both ends of transmissions, access controls sufficient to prevent unauthorized access, and continual upgrades of systems, software, and security protocols (including appropriate staff training). Provided those mechanisms are properly implemented, remote access computer networks can be used as safely as traditional hard-wired computer networks (Business Wire, 2003; Newman, 2009 p228).
Conclusion

Remote access computer networks have already substantially changed the way that computers are used throughout American society. That is particularly true in the case of professional business computer applications. Already, many private-sector and government entities have begun relying on remote access computer networks for standard business computing functions.

Some of the most important capabilities in that regard pertain to the manner in which emote access computer networks permit multiple users to share files and applications, business presentations, and conferencing without requiring users to be in the same location. Similarly, remote access computer networks now allow staff training to be conducted remotely. Finally, it is anticipated that within the next decade, remote access computer networks will allow tremendous growth in teleworking which is likely to radically change the way much of ordinary professional business is conducted.

Works Consulted

"Remote Access Security Center Announced by Positive Networks." Business Wire.

Business Wire. 2003. HighBeam Research. 19 Dec. 2009 .

Qiang Huang, and Jazib Frahim. SSL Remote Access VPNs. 2008. Cisco Publishing.

Robert Newman. Computer Security: Protecting Digital Resources. 2009. Jones & Bartlett Publishers.

Sources used in this document:
Resources. 2009. Jones & Bartlett Publishers.
Cite this Document:
Copy Bibliography Citation

Related Documents

Remote Access to a School Network
Words: 506 Length: 2 Document Type: Essay

network I am on is a relatively typical one, taking into account that it involves a series of computers being connected to the network via a login server, an address server, a file server, and a remote access server. All of these are protected by a firewall and then connect directly to the internet. The firewall is designed to prevent attacks from reaching various locations on the network. Protection

Access Control Types of Access
Words: 1816 Length: 7 Document Type: Term Paper

These certificates are issued by the certification authorities (CAs) and they contain the name, expiration dates as well as serial numbers of the certificates. OS Hardening Operating system hardening is the process of addressing the various security issues and vulnerabilities in a given operating system via the implementation of the latest Operating system patches, updates, hotfixes as well procedures and policies that are necessary for reducing the number of attacks as well

Computer Hacker Nefarious Notions III
Words: 9646 Length: 35 Document Type: Term Paper

(Hackers Chronology, 2006). 1989 The first case of cyber espionage is recognized in Germany (west). This reportedly involved the CHAOS computer club. "Mentor releases the hacker manifesto Conscience of a hacker, which ends with the intriguing line: 'You may stop the individual, but you can't stop us all.'" (Hackers Chronology, 2006). 1990 Electronic Frontier, Freedom on the Internet advocacy group, is launched Polymorphic viruses (which modifies themselves when they spread), along with other sophisticated kinds of

Computer Network Security Issues Computer
Words: 1894 Length: 6 Document Type: Research Paper

In some instances, policies implemented mainly as cost-effective shortcuts to network system security have cost otherwise good employees their jobs for violations of excessively restrictive network use policies. In the realm of the home computer user, it is possible to buy many new redundant or unnecessary security programs and features. Generally, appropriate network security should not interfere noticeably with either personal home computer use or computer system use in

Computer Misuse Legislation Unfit for
Words: 2485 Length: 7 Document Type: Essay

Knowledge of e-crime from the perspective of crime science is insufficient in devolution of the problem, which cuts across various sections of social interaction through computers. There is a limitation in the forensic and social / legal exploration of information technology aspects and that is the possible cause of the limitations of the jurisdictions of the computer crime legislation, creating the insufficiency in the fulfillment of its purpose (Tonry

Computer Systems Are Increasingly Being Used to
Words: 1916 Length: 6 Document Type: Essay

computer systems are increasingly being used to cause widespread damage, with nation-states or individuals sponsored by nation-states making use of malicious codes to compromise 'enemy' information systems. In essence, cyber warfare has got to do with the attack on the information networks, computers, or infrastructure of another entity by an international organization or nation-state. In the context of this discussion, cyber war will be taken as the utilization of

Sign Up for Unlimited Study Help

Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.

Get Started Now