Maseno University Repository

A Domains Approach to Remote Access Logical Vulnerabilities Classification

Show simple item record

dc.contributor.author S. Ndichu, S. McOyowo, H Okoyo, C. Wekesa
dc.date.accessioned 2020-11-24T11:01:35Z
dc.date.available 2020-11-24T11:01:35Z
dc.date.issued 2019
dc.identifier.uri https://repository.maseno.ac.ke/handle/123456789/2951
dc.description.abstract Remote access facilitates collaboration and the creation of a seamless work environment. This technology enables employees to access the latest versions of data and resources from different locations other than the organization’s premises. These additional locations include home or untrusted networks not governed by the organization's security policy and baseline. Balancing between security and accessibility is a significant challenge. Remote access can be a highsecurity risk if not correctly safeguarded and monitored. This paper presents some technologies and methods for remote access. It then highlights security concerns, attack vectors, and logical vulnerabilities in remote access. To address these security concerns and weaknesses, we present a domains approach to logical vulnerabilities in remote access and vulnerability scoring using the Common Vulnerability Scoring System (CVSS). Domains simplify device and user authentication and separate the organization network into logical and discrete entities. The separation enables a unique security application to each domain. Vulnerability scoring enhances remediation efforts through prioritization of the logical vulnerabilities. The approach comprehensively covers all points of compromise during remote access and contributes to effective logical vulnerability management. The results of the experiments provide evidence that all remote access domains have a high severity rating of at least a 7.28 CVSS score. Our study highlights the drawbacks of the current remote access methods and technologies such as the Virtual Private Network (VPN) and shows the importance of securing all domains during remote access. en_US
dc.publisher MECS: http://www.mecspress.org/ijcnis/ijcnis-v11-n11/IJCNIS-V11-N11-5.pdf. en_US
dc.subject Remote access, logical vulnerabilities, domains, attack vectors, vulnerability scoring. en_US
dc.title A Domains Approach to Remote Access Logical Vulnerabilities Classification en_US
dc.type Article en_US


Files in this item

This item appears in the following Collection(s)

Show simple item record

Search Maseno University Repository


Browse

My Account