Fill This Form To Receive Instant Help

Help in Homework
trustpilot ratings
google ratings


Homework answers / question archive / What are the advantages, strengths and/or weaknesses of remote access methods and techniques such as RADIUS, RAS, TACACS+  and VPN?  

What are the advantages, strengths and/or weaknesses of remote access methods and techniques such as RADIUS, RAS, TACACS+  and VPN?  

Computer Science

What are the advantages, strengths and/or weaknesses of remote access methods and techniques such as RADIUS, RAS, TACACS+  and VPN?

 

pur-new-sol

Purchase A New Answer

Custom new solution created by our subject matter experts

GET A QUOTE

Answer Preview

Remote access enables users to access the computer network through a network connection; the primary goal of internal access is to enable access to the internal network from external sources (.Foster,  2016). Some methods are applied to enable users to access a private network from a remote area. The main method and mechanisms that are applied include - RADIUS, RAS, TACACS+, and VPN. These techniques play a different role, and their main features are fundamental to any system setup. The main advantage of remote access techniques includes – saving costs, provide system flexibility, and offers security to the user. However, the techniques have some weaknesses that make that vulnerable – some of the weaknesses the code may be cracked, open internal system to external files.

The remote access service (RAS) provides a client platform to connect to the host. RAS provides easy access to the platform; thus, it's easy to connect to the organization's database. This saves the cost of purchasing USB storage devices. The remote access method provides users access to internal assets through the internet; the internet networks are unsecured, and thus, they expose the organization's information system to external hackers.  The remote access techniques – RADIUS, VPN, and TACACS+ ensure the network is secure. VPN helps to encrypt the information, and data are communicated through the internet (Support et al., 2020). once the information is encrypted, the users are required to apply a code to access this information. RADIUS and TACACS+ are communication protocols that provide a centralized management system for RAS authentication, authorization, and accounting.

The remote access techniques have some weaknesses that make them vulnerable. Though the information and data transferred on the internet are encrypted, there are not 100% secure. The hacker may know how to crack the code to encrypt the information (Sheehan, 2016). remote access opens the system to receive external files; if not well managed, hackers file security holes to send the malicious file in the system.

Related Questions