The Dangers of Using Public Systems for Remote Access
Click here to download now
Overview: Most organization knows that proper security measures must be taken before laptops and other portable devices can be used to access corporate assets over the Internet. Even though much effort is spent on trying to secure these systems, many employees both can and are allowed to use other non corporate-controlled systems to access internal resources, systems that are beyond the control of corporate system administrators. The list of such systems can range from home PCs to public computers found in airports, cafés and Internet kiosks. This paper discusses security problems when using public systems for remote access.