Show simple item record

dc.contributor.authorS. Ndichu, S. McOyowo, H Okoyo, C. Wekesa
dc.date.accessioned2020-11-25T07:21:10Z
dc.date.available2020-11-25T07:21:10Z
dc.date.issued2019
dc.identifier.urihttps://repository.maseno.ac.ke/handle/123456789/2999
dc.description.abstractRemote access facilitates collaboration and the creation of a seamless work environment. This technology enables employees to access the latest versions of data and resources from different locations other than the organization’s premises. These additional locations include home or untrusted networks not governed by the organization's security policy and baseline. Balancing between security and accessibility is a significant challenge. Remote access can be a highsecurity risk if not correctly safeguarded and monitored. This paper presents some technologies and methods for remote access. It then highlights security concerns, attack vectors, and logical vulnerabilities in remote access. To address these security concerns and weaknesses, we present a domains approach to logical vulnerabilities in remote access and vulnerability scoring using the Common Vulnerability Scoring System (CVSS). Domains simplify device and user authentication and separate the organization network into logical and discrete entities. The separation enables a unique security application to each domain. Vulnerability scoring enhances remediation efforts through prioritization of the logical vulnerabilities. The approach comprehensively covers all points of compromise during remote access and contributes to effective logical vulnerability management. The results of the experiments provide evidence that all remote access domains have a high severity rating of at least a 7.28 CVSS score. Our study highlights the drawbacks of the current remote access methods and technologies such as the Virtual Private Network (VPN) and shows the importance of securing all …en_US
dc.subjectRemote access, logical vulnerabilities, domains, attack vectors, vulnerability scoring.en_US
dc.titleA Domains Approach to Remote Access Logical Vulnerabilities Classificationen_US
dc.typeArticleen_US


Files in this item

Thumbnail

This item appears in the following Collection(s)

Show simple item record