Remote Access Technologies

Video Activity
Join over 3 million cybersecurity professionals advancing their career
Sign up with
or

Already have an account? Sign In »

Time
1 hour 43 minutes
Difficulty
Intermediate
CEU/CPE
2
Video Transcription
00:01
Hi, everyone, welcome back. Let's begin our topic on remote access technologies.
00:08
Remote access technologies are tools used to access a network device remotely. This means you won't have to always be physically connected to the device in order to access it.
00:19
It uses the client server model, which requires the client to enter user credentials
00:25
to access the remote device server.
00:28
This generally helps to assure that only authorized personnel can only access the remote device and make authorized modifications to the settings and configurations on the system.
00:39
They're too common ways to remote access, which are command line interface CLI
00:45
or remote desktop application. Common CLI based protocols are telnet and ssh
00:53
tools such as Windows Command Prompt can be used for telnet. And third party applications like putty can be used for both Telnet and ssh.
01:03
Remote desktop software provides a graphical mirror view off a systems machine. You can use third party software such as team, viewer or any desk, as you can simply access a remote PC. As long as Internet is available
01:18
for better security, you may want to establish a VPN connection and then used when those remote desktop to access the remote PC
01:30
Telnet uses TCP Port 23 by default tell that server is installed and should be enabled on the remote device and the town that client software should be installed
01:41
and enabled on a laptop or PC.
01:45
It is communicated in clear text format, which poses as a security threat if a packet sniffer is put in place between the client and the server because it is intercepting and logging the traffic.
01:57
This is why it is advised not to use talent over the Internet as cyber criminals are on the lookout for such vulnerabilities on your network.
02:07
This is where or why. As this H or Secure Shell was developed as a secured alternative to tell Net.
02:15
It follows a similar concept of his predecessor whereby an SSH server is installed and enabled on a remote device and the ssh client software will be installed and enabled on a PC or laptop.
02:29
The key differences are that S S H uses TCP port 22 by default and that data communications is now encrypted.
02:38
This is the recommended format to use when using CLI remote access over the Internet.
02:50
Remote desktop applications allow remote access to another computer
02:54
in a more graphical representation as it mirrors the view of the remote PC
03:00
Microsoft Remote desktop connection is a common example of this, which is a built in feature in Windows computers and can be downloadable for Mac computers.
03:09
There are third party applications as well that you can use, such as team, viewer or any desk,
03:15
which only requires the client and remote device toe. Have Internet access and knowing the user credentials of the remote PC
03:23
Once it's installed, these applications are integrated to be either a server or clients.
03:30
User ID's tend to be fixed while the pastors are randomly generated by default each time you close and open the application.
03:38
You can, however, enter in your own custom password. But just remember to follow the usual best practices when creating a password, such as using alpha numeric characters at an acceptable length of at least eight characters and something uncommon but yet easy to remember.
04:00
All right, Chris Time.
04:01
Generally, what are the two important elements you usually need to input when you remote access into a system
04:19
user name or i D and password
04:28
In network operations, it is recommended to use VP and technology when you remote access into your systems over the Internet,
04:35
as we have learned, it will keep your data and communications encrypted when you perform your tasks.
04:43
When using CLI, remote access is also recommended to use as his h
04:47
maybe in a test environment, she can make things easier by using. Tell nets
04:53
the one to make them operational and require accessing them over an unsecure network. Make sure to change from telnet to ssh.
05:00
Add in a little A C l for increased security
05:04
toe only Allow white list of authorized I'd be host or unauthorized i p sub net to execute as S. H. Also, you can use this log to track user access and changes on your systems,
05:20
and we're done with our topic on remote access technologies. So to summarize what we discussed,
05:28
we learned the types of remote access which is tell net as S H and remote desktop.
05:33
We also covered a little bit on the remote access best practices in network operations.
05:41
So let's head over to our next topic. See, there
Up Next