Remote Control Software – The 6 Security-Pitfalls You Should Avoid
by: Kristian Polack
There are numerous ways for an individual to gain access to your confidential information
and business data on your computer when you employ remote control software. In spite of the risks it is not necessarily a risky business to invest and implement remote control software. If you make sure that
your provider can supply a satisfactory solution to the presented 6 risk areas you will be able to enjoy all the advantages of remote control software without hesitation.
A remote control system
consists of two primary agents: the host and the guest. You are the host and you should have completely control over who you invite. The best overall method to avoid unwelcome guests is to make sure that
your software has the top of the line encryption and a strong overall focus on the pending security issues.
We have pinned the security pitfalls out in six risk areas and we recommend that you
consider all six risk areas when you research your possible purchase of remote control software. The six areas are:
1. Unauthorized access across the wire. Popularly known as "high jacking". We have
identified the following key parameters to avoid high jacking:
• MAC/IP address check
• Closed user group
• User controlled access
2. Eavesdropping and alteration. Protect the traffic between guest and host modules against eavesdropping and unauthorized alteration of data. Make sure your system has strong features in Encryption
(only you and your guest should be able to read the information transmitted). Integrity and message authentication (verify the encrypted data). Key exchange (exchange the right encryption keys for the data
3. Security context. It is imperative that the Host components run in proper security contexts on the operating system.
4. Unauthorized change of the Host. Make sure that all
maintenance is only accessed through a password and thus prevent unauthorized change of the Host configuration.
5. Adequate range of alerts and security options. An example: The Host must be able to
disconnect the Guest user or even restart Windows after reception of a pre-defined number of invalid logon attempts in order to reduce the number of invalid attempts per hour. And you would want a neat range
of alert types when someone is trying to access your computer.
6. Adequate event logging. Your system should offer extensive event logging to document a possible attack. All session activity and log
on attempts should be logged, preferably in a central database
It is absolutely essential in remote control software that you can ensure that access to data is protected from unauthorized users.
Hackers can and will use foot printing, such as port scans, ping sweeps, and NetBIOS enumeration that can be used to glean valuable system-level information to help prepare for more significant attacks.
Finally, hackers can attempt to hijack a session, that is, they can try to takeover one end of an already established session.
Your remote control program should contain security features that
counteract the methods described to hack into a computer. If you engage with a supplier who is covered in the six risk areas then you're on your way to improve business efficiency, help system administrators
and reduce cost of IT and enjoy many more inherent features with remote control software.
Danware A/S develops and sells software products based on its NetOp Remote Control technology ( http://www.netop.com/
), which allows fast, secure and stable transfer of screen images, sound and data between two or more computers.
This article was posted on March 1, 2007
About The Author
Kristian Polack wrote this how-to.