From the course: ISC2 Systems Security Certified Practitioner (SSCP) (2024) Cert Prep

Unlock this course with a free trial

Join today to access over 24,900 courses taught by industry experts.

Remote network access

Remote network access

- [Instructor] Earlier in this course, you learned how remote users can use virtual private networks or VPNs to virtually place their devices on a remote network, using an encrypted internet connection. There are two other technologies commonly used to gain remote network access, remote shells and Remote Desktops. Remote shells commonly found on Linux systems provide administrators with command-line access to a system located on a remote network. The user sees the normal Linux prompt and may interact with a server as if he or she were present at the keyboard. Remote Desktops, commonly used on Windows systems, provide administrators with graphical access to the desktop of the remote system. In early Linux systems, remote users used a protocol called Telnet to gain remote shell access to Linux systems. However, this protocol was not built with security in mind. It doesn't use any encryption and anyone eaves dropping on a…

Contents