From the course: ISC2 Certified Information Systems Security Professional (CISSP) (2024) Cert Prep

Unlock this course with a free trial

Join today to access over 24,000 courses taught by industry experts.

Remote network access

Remote network access

- [Instructor] Earlier in this course, you learned how remote users can use VPNs to virtually place their devices on a remote network using an internet connection. There are two other technologies commonly used to gain network access, remote shells and remote desktops. Remote shells commonly found on Linux systems provide administrators with command line access to a system located on a remote network. The user sees the normal Linux prompt and may interact with the server as if they were present at the keyboard. Remote desktops provide administrators with graphical access to the desktop of a remote system. In early Linux systems remote users used a protocol called Telnet to gain remote shell access to systems. However, the Telnet protocol was not built with any security in mind. Telnet does not use encryption and anyone eavesdropping on a Telnet connection can see everything that the user is typing, along with the remote systems response. That includes the password, so it's clearly not…

Contents