Information technology - Security techniques - IT network security - Part 4: Securing remote access
|Publication Date:||29 June 2005|
|ICS Code (Information coding):||35.040|
This part of ISO/IEC 18028 provides guidance for securely using remote access - a method to remotely connect a computer either to another computer or to a network using public networks and its implication for IT security. In this it introduces the different types of remote access including the protocols in use, discusses the authentication issues related to remote access and provides support when setting up remote access securely. It is intended to help network administrators and technicians who plan to make use of this kind of connection or who already have it in use and need advice on how to set it up securely and operate it securely.