From the course: CISSP Cert Prep (2021): 4 Communication and Network Security

Unlock the full course today

Join today to access over 22,600 courses taught by industry experts or purchase this course individually.

Remote network access

Remote network access

From the course: CISSP Cert Prep (2021): 4 Communication and Network Security

Start my 1-month free trial

Remote network access

- [Instructor] Earlier in this course, you learned how remote users can use VPNs to virtually place their devices on a remote network using an internet connection. There were two other technologies commonly used to gain network access; remote shells and remote desktops. Remote shells commonly found on Linux systems provide administrators with command line access to a system located on a remote network. The user sees a normal Linux prompt and may interact with the server as if they were present at the keyboard. Remote desktops provided administrators with graphical access to the desktop of a remote system. In early Linux systems, remote users used a protocol called Telnet to gain remote shell access to systems. However, the Telnet protocol was not built with any security in mind. Telnet does not use encryption and anyone eavesdropping on a Telnet connection can see everything that the user is typing along with the…

Contents