Remote Access

From SI410
Revision as of 22:59, 11 March 2021 by Abevoor (Talk | contribs) (Ethical Ramifications)

Jump to: navigation, search

Remote access, also known as remote desktop, is the ability to access a computer or device from any remote location. Using remote access software installed on a computer, it is possible to gain full control of a secondary device, including running applications and accessing files. Remote access is typically used to allow employees to access company data or servers from different locations, but may also be used as a form of remote administration.

Requirements

Remote access software has become exponentially implemented since the start of the COVID-19 pandemic as a means of employees completing work while maintaining CDC social distancing guidelines. While individual applications function differently across devices, certain procedures must be followed that are uniform among all remote access platforms.

Remote Access Application

To access any device remotely the correct software must first be downloaded and installed on all of the devices involved in the remote access program. Remote desktop products are typically available in three models: hosted service, software, and appliance.

Internet connection

A stable internet connection is needed in order to effectively use remote access features. Once the proper applications are installed, the software on the device can be opened and used to remote into the device of a user’s choice. The remote connection should be instant and continuous as long as neither computer is turned off or disconnected from the internet.

Implementation

Businesses

Remote Workers

Many businesses have taken advantage of the accessibility of remote access software to hire employees that do not live near the office of employment. This has allowed workers to access company servers and data across distances and time zones, allowing for a much broader and diverse workforce of employees. Similarly, remote administration has also been implemented by many businesses as a means of solving IT issues that arise. While previous models required on-site technical support, remote access applications have allowed support staff to access user devices from an external site. This, in turn, has streamlined the troubleshooting process as it allows for technical support workers to implement shutdown functions, access peripheral networks, and view and modify files and data stored on the user computer.

Accessibility

One notable development in the accessibility of remote working is the potential for physically handicapped workers to work from home. It is estimated that only 40% of adults aged 25 to 54 in the United States with disabilities have a job. This is mainly due to the barriers posed to people with disabilities in the conventional working environment. The use of remote access software has allowed for handicapped workers that are unable to physically enter a workplace environment to work from home instead.

Education

Remote access schooling has become commonplace since the start of the COVID-19 pandemic. As of September 2020, students have used remote access software as a means of accessing school computers in order to access homework and educational material provided by the school district. Through remote access, programs that would otherwise require purchasing more licenses, such as video editing, animation, 3D designing, and other resources, are available to educators and students.

Education has also been facilitated through remote access learning by introducing one on one communication between students and teachers. Remote access software has been used by educators to remote into student devices in order to perform demonstrations for concepts directly onto the students' screen.

Ethical Ramifications

Cyber Security

Cyber Security: Remote access client devices generally have weaker protection than standard client devices. Many devices used with remote access software are not managed by the enterprise, resulting in no protection from existing firewalls and antivirus present on company devices. Additionally, client remote access devices often lack physical security controls. These devices are more commonly stored in bags or homes which are not afforded the same physical protection that is provided to devices stored in an enterprise building. Finally, remote access communications can be carried over untrusted networks, increasing the risk of losing private or personal data while communicating with a remote device.

A brief overview of the risks associated with remote access software include:

  • Monitoring of communications over a network
  • Deployment of rogue wireless access points
  • The exploitation of client devices through other practices designed to collect sensitive data (phishing, keylogging, etc.)
  • Unauthorized access to resources by a third-party
  • Loss of remote access devices to untrusted parties

Privacy

With the implementation of remote access software allowing employees to work from anywhere, employees are able to access intellectual property information from unsecured remote locations, outside perimeter-based security measures that can be monitored securely within office environments. As a result, these unsecured work environments can lead to inadvertent and nefarious unauthorized data leaks. As noted by ethical data experts, employees can use their remote access positions to leak or sell sensitive information to consumers, resulting in breaches of "Non-Disclosure and Non-Use Agreements" between employees and companies.

Steps taken to mitigate the unethical use of sensitive data by employees include using the REVISE framework as detailed by Ariely and et al. in order to guide intervention policies.

Malicious variants