Your Federal Quarterly Tax Payments are due April 15th Get Help Now >>

Secure Remote Access by NWiF1Ybs


									Security Roundtable
   Uses for Remote Access
     Do work from home
     Access to campus systems as if you were on
   Risks of Remote Access
     Unencrypted sessions can be snooped
     May leave remote station unprotected
 Windows Remote Desktop
 Other Remote Access Options
Remote Desktop Protocol
 Included with Windows XP
 Uses 128-bit RC4 encryption
 Does not use shared
 Supports file transfers
 Is allowed through campus
  firewall (but not for long)
Remote Desktop Protocol
   Works over TCP
    Port 3389
 Open Source (Free)
 No encryption by default, but can be
  added with a plug-in
 Uses shared sessions
 Supports file transfers
 Java viewer
 Default port is 5900
RealVNC Free
 Open Source (Free)
 No encryption
 Uses shared sessions
 Does not support file transfers
 Cross-Platform
 Java Viewer
 Default port is 5900
 Commercial Product (Not Free)
 AES-256 encryption
 Uses shared sessions
 Supports file transfers
 Additional features such
  as remote terminal,
  remote shutdown, and
 Default port is 4899
K-State VPN
 Creates an encrypted tunnel for all traffic
  going to and from K-State
 Gives you a K-State IP address
 Allows you to get
  around campus
  border firewall
 Telnet is unencrypted and login
  information is sent in clear text
 Unix server supports
  SSH (encrypted)
 PuTTY included in
  the Cat Pack
File Transfer
 FTP is unencrypted and login info is
  sent in clear text
 Unix server supports SFTP and SCP
 WinSCP included
  in the CatPack
Demonstration & Questions

To top