Priyanka Sunkara_Assignment #6_Remote Access Security Plan and Documentation.docx

Priyanka Sunkara_Assignment #6_Remote Access Security Plan and Documentation.docx

Info icon This preview shows pages 1–3. Sign up to view the full content.

Week 6: (RS) Assignment 6: Remote Access Security Plan and Documentation ( Priyanka Sunkara ) Tasks Develop a network security plan, basic topology, and VPN plan for this remote office. The security plan should keep the main office and its digital assets safe in case of a failure at the remote office. Describe the Network Topology to connect the Remote Office as shown above to the Corporate Office: As a technology associate, I believe that the following is how a remote access security plan should be developed and implemented. It will segment the four major groups (Project Management, Engineering, Drafting, and Architecture) and allow for certain key employees to have access to the main office and remote office computer services. It will also outline the security plan, basic remote access network topology and how it will keep the main office and its digital assets safe in case of failure at a remote office. For the segmentation, using Virtual Private Networks, or VPNs, an organization can help secure private network traffic over an unsecured network, such as the Internet.
Image of page 1

Info icon This preview has intentionally blurred sections. Sign up to view the full version.

VPNs help provide a secure medium for encrypting and encapsulating private network traffic and moving it through an open network. Data is encrypted for confidentiality, and packets that might be intercepted on the shared or public network are indecipherable without the correct encryption keys. Data is also encapsulated with an IP header containing routing information. VPNs help enable users working at home, on the road, or at a branch office to connect in a secure fashion to a remote corporate server using the Internet. Users on the corporate intranet, or the Internet, with appropriate permissions can establish a remote access VPN connection with the VPN server and gain access to the protected resources. For those users who are not authorized to establish a VPN connection, the separate network segment is hidden from view. From the users’ perspective, the VPN is
Image of page 2
Image of page 3
This is the end of the preview. Sign up to access the rest of the document.

{[ snackBarMessage ]}

What students are saying

  • Left Quote Icon

    As a current student on this bumpy collegiate pathway, I stumbled upon Course Hero, where I can find study resources for nearly all my courses, get online help from tutors 24/7, and even share my old projects, papers, and lecture notes with other students.

    Student Picture

    Kiran Temple University Fox School of Business ‘17, Course Hero Intern

  • Left Quote Icon

    I cannot even describe how much Course Hero helped me this summer. It’s truly become something I can always rely on and help me. In the end, I was not only able to survive summer classes, but I was able to thrive thanks to Course Hero.

    Student Picture

    Dana University of Pennsylvania ‘17, Course Hero Intern

  • Left Quote Icon

    The ability to access any university’s resources through Course Hero proved invaluable in my case. I was behind on Tulane coursework and actually used UCLA’s materials to help me move forward and get everything together on time.

    Student Picture

    Jill Tulane University ‘16, Course Hero Intern