answersLogoWhite

0


Best Answer

Remote access gives an attacker an opportunity to get into your server. And usually they get root access aswell, due to the fact its normally only admins who remotely log into servers. For example, something that happened me a few years back, I was at a relatives house when I got a call saying that a certain user forgot their password and couldn't get on the network. I logged into the server from my relatives computer, and gave the user a new password. But I didn't know there was a keylogger on my relatives computer. The following week the network AD was wiped out. The person who planted the keylogger had instantly gotten root.



(IF looking for Network+ Guide to Networking answer use this one)

Access servers enable computers to dial in to a network and obtain access to its resources, thereby exposing the network to the outside world.

User Avatar

Wiki User

14y ago
This answer is:
User Avatar
More answers
User Avatar

Wiki User

14y ago

Security is the process of applying confidentiality to data and making sure that only authorized individuals have access to the data. One of the problems of breaching a network and stealing confidential information is that the victim (company) loses goodwill.

Goodwill is hard to measure exactly, but we know that it leads to loss of revenue, as clients and customers of the network leave to go elsewhere where their data is protected.

Then there is also the legal aspect; if you do not give permission to a company to give out confidential information about you that they have collected then when the information is revealed (without your permission) the company is liable legally for damages and for failure to provide "due care" because of missing "due diligence" relating to the protection of confidential information.

This answer is:
User Avatar

User Avatar

Wiki User

14y ago

Access servers enable computers to dial in to a network and obtain access to its resources, thereby exposing the network to the outside world.

This answer is:
User Avatar

Add your answer:

Earn +20 pts
Q: Why is security such a significant concern when using remote access servers on a network?
Write your answer...
Submit
Still have questions?
magnify glass
imp
Related questions

Proxy servers allow network administrators to?

increase security


What is a difference between a system and a network?

Operating system protects the computers data from viruses and hackers on the network.. network security protects all devices, servers,m computers ,mainframes on the network.


What specialized computers manage network resources and allow computers access to the network?

File servers do those things. There are specialized servers as well, for example web servers, database servers, remote access servers, fax servers--the list goes on and on. But file servers are the backbone of providing access and managing files and who has access to what resources at which times.BTW. Access to the network is usually referred to as Authentication. And Rights or Security Management is usually what controls access to files, printers, and other resources.


What is the difference between a network operating system and operating system security?

Network security concentrates on the packets of information flowing between computer systems.Operating System security controls access to resources on the server itself.Therefore, the two are looking at different things in terms of security.


What file system supports file security?

File Security products protect sensitive file data stored on file servers and network attached storage devices.


What are the u ses of information technology in security?

This very much depends on what type of security you speak of. Information Security is most often categorized broadly but has to do with keeping unwanted people out of servers and end-user computer systems, there are many jobs in the field of security, its best known for its white hat hackers who penetrate computer systems and network in an attempt to better the stability and security of a network. Analysts analyze and manipulate data from routers and servers used to record events in an attempt to find faults in a network.


You know Hostinc offers the best mail servers with power and network guarantees?

Hostinc offers the best mail servers with power and network guarantees. HostInc provides total control, maximum performance, ultimate functionality, and security at a low cost.


What network security tools are useful when an audit is imminent in a small company?

The network security tools that you should have in place include firewalls, proxy servers, encryption, logical security and access controls, anti-virus software and log management tools. It is also vital to make sure that everything has been updated to the most current versions available ensure network security.


What are the Features of network security?

Enterprise security software products provide many features that help to protect companies. Some of the features include the protection of databases, infrastructure such as servers, private and sensitive data, firewalls, protection against hacking and data loss and many more.


What is the barracuda appliance about?

Barracuda is the name of a technology company that provides security, networking and storage for servers and other network appliances. They have numerous "appliances" for sale or lease.


Does the use of one or more servers distinguishes a client and server network from a peer-to-peer network?

The use of one or more servers distinguishes a client/server network from a peer-to-peer network.


Why every network attached to the Internet has at least two servers designated as DNS servers?

Encase one of the servers fail