Page 120 - StudyBook.pdf
P. 120

104    Chapter 3 • Communication Security: Remote Access and Messaging

             Introduction


             The Security+ exam covers communication security. Data transmissions, particu-
             larly via e-mail or remote access methods, are typically an entity’s most exploited
             vulnerability.With the advent of high-speed Internet, securing remote access tech-
             nologies has become a greater focus for security professionals than ever before.
             While the ability to dial into the workplace was once a luxury afforded those who
             worked for prestigious corporations on the bleeding edge of technology, nearly
             everyone in corporate America now expects their employer to provide some level
             of connectivity to their work environment from home.Vendors ship virtual private
             network (VPN) clients as part of operating systems (OSes) or as free downloads,
             and even Personal Digital Assistant (PDA) devices enable the use of VPN and
             Terminal Services software. Business models have also changed to incorporate
             “remote work forces” and the building of shared “network spaces” that enable
             secure collaboration with partner companies who require access to company
             resources.
                 The practice of implementing and managing e-mail communication has also
             morphed. PDAs—once known as electronic DayTimers—are now pocket-sized
             mobile computers running OSes that can both transmit and store e-mail and docu-
             ments. E-mail is no longer “retrieved” from servers via a push/pull technology, but
             is now sent to devices across the world via an over the air “push” from internal e-
             mail servers. Even laptop users can establish encrypted sessions to these servers from
             public locations without the use of a VPN connection via technology that comes
             “out of the box” in a typical installation of Outlook. Beyond this, the concept of
             “messaging” includes technologies beyond e-mail: Instant Messaging (IM) clients
             are now provided by public vendors such as Yahoo! and AOL, as well as major cor-
             porate solutions players like Microsoft.As such, IM solutions now include file
             transfer and workspace technologies that bring both collaboration efficiencies and
             vulnerabilities to the work place.
                 This chapter covers the technologies that a Security+ technician needs to be
             familiar with when dealing with VPNs and the Point-to-Point Tunneling
             Protocol/Layer 2 Tunneling Protocol (PPTP/L2TP) protocols that aid in protecting
             communications.Technologies used for remote access such as Remote
             Authentication Dial-in User Service (RADIUS),Terminal Access Controller Access
             Control System+ (TACACS+), Secure Sockets Layer (SSL),VPN, and Citrix solu-
             tions are also defined later in this chapter.






          www.syngress.com
   115   116   117   118   119   120   121   122   123   124   125