4.9 Given a scenario, use remote access technologies

RDP
Remote Desktop Protocol
Used exclusively with Microsoft Operating Systems; MSTSC
RDP used Transport Layer Security (TLS) 128-bit encryption
Can only have 2 connections at one time
Port 3389
image
image.png
Telnet
Telnet is an older remote access protocol for Linux, UNIX, and network device operating systems.
Provides unencrypted remote text console access; not considered secure
Anybody can eavesdrop on the session
TCP Port 23
VNC
VNC (Virtual Network Computing) is an open-source remote control tool for the sharing of desktop.
Only allows one console session
Port 5900
Normally used by MacOS systems.
SSH
SSH (Secure Shell) is commonly used for remote access via a text console for Linux and UNIX operating systems.
Encrypts all communication, provides remote PC access, and remote application access
PuTTY is often used and provides various methods to connect to a remote PC.
Port 22
Third-Party Tools
Screen Share feature
Quick Assist
an included remote access tool that comes with each Microsoft Windows is Quick Assist.
File Share

Security considerations of each access method
Each one of these remote access technologies discussed in this chapter have security considerations.
Before using a remote technology, you should first consider the nature of the information you are trying to access remotely.
Determine what kind of data is being exchanged and consider the encryption level needed.
Ex. Telnet is good for any non-sensitive information like weather reports or sports news
Ex. SSH should be used for any kind of sensitive information like passwords, usernames, or confidential emails.

Want to print your doc?
This is not the way.
Try clicking the ⋯ next to your doc name or using a keyboard shortcut (
CtrlP
) instead.