answersLogoWhite

0

Remote access gives an attacker an opportunity to get into your server. And usually they get root access aswell, due to the fact its normally only admins who remotely log into servers. For example, something that happened me a few years back, I was at a relatives house when I got a call saying that a certain user forgot their password and couldn't get on the network. I logged into the server from my relatives computer, and gave the user a new password. But I didn't know there was a keylogger on my relatives computer. The following week the network AD was wiped out. The person who planted the keylogger had instantly gotten root.



(IF looking for Network+ Guide to Networking answer use this one)

Access servers enable computers to dial in to a network and obtain access to its resources, thereby exposing the network to the outside world.

User Avatar

Wiki User

15y ago

What else can I help you with?

Related Questions

Proxy servers allow network administrators to?

increase security


What server type is responsible for network security?

The server type responsible for network security is typically a firewall server. This server monitors and controls incoming and outgoing network traffic based on predetermined security rules, helping to prevent unauthorized access and potential threats. Additionally, security servers may include intrusion detection systems (IDS) and virtual private network (VPN) servers, which further enhance the protection of network data and resources.


What specialized computers manage network resources and allow computers access to the network?

File servers do those things. There are specialized servers as well, for example web servers, database servers, remote access servers, fax servers--the list goes on and on. But file servers are the backbone of providing access and managing files and who has access to what resources at which times.BTW. Access to the network is usually referred to as Authentication. And Rights or Security Management is usually what controls access to files, printers, and other resources.


What is a difference between a system and a network?

Operating system protects the computers data from viruses and hackers on the network.. network security protects all devices, servers,m computers ,mainframes on the network.


What is the difference between a network operating system and operating system security?

Network security concentrates on the packets of information flowing between computer systems.Operating System security controls access to resources on the server itself.Therefore, the two are looking at different things in terms of security.


What file system supports file security?

File Security products protect sensitive file data stored on file servers and network attached storage devices.


What are the u ses of information technology in security?

This very much depends on what type of security you speak of. Information Security is most often categorized broadly but has to do with keeping unwanted people out of servers and end-user computer systems, there are many jobs in the field of security, its best known for its white hat hackers who penetrate computer systems and network in an attempt to better the stability and security of a network. Analysts analyze and manipulate data from routers and servers used to record events in an attempt to find faults in a network.


You know Hostinc offers the best mail servers with power and network guarantees?

Hostinc offers the best mail servers with power and network guarantees. HostInc provides total control, maximum performance, ultimate functionality, and security at a low cost.


What network security tools are useful when an audit is imminent in a small company?

The network security tools that you should have in place include firewalls, proxy servers, encryption, logical security and access controls, anti-virus software and log management tools. It is also vital to make sure that everything has been updated to the most current versions available ensure network security.


Why are the sales and hr servers connected to the network at the access layer?

Sales and HR servers are connected to the network at the access layer to facilitate direct communication and data exchange between end-users and the servers. This setup allows employees to access necessary applications and data quickly and efficiently, enhancing productivity. Additionally, connecting these servers at the access layer helps to streamline network management and improve security by allowing for more granular control over user access and data flow.


What is the barracuda appliance about?

Barracuda is the name of a technology company that provides security, networking and storage for servers and other network appliances. They have numerous "appliances" for sale or lease.


Does the use of one or more servers distinguishes a client and server network from a peer-to-peer network?

The use of one or more servers distinguishes a client/server network from a peer-to-peer network.