Security Threats of Remote Access
There are a vast number of threats that can affect a network, because of the use of remote access. The primary problem first arises when another network is allowed to access the private network; this is a necessary component of remote access, therefore it cannot be removed altogether.
When an individual uses remote access to connect to the network, the individual might be a trusted party to the network; however, the secondary network may not be. The connection between the two is only allowed because there is a transitive relationship created; which means the enterprise trusts the individual, and the individual trusts the secondary network. Therefore the enterprise sanctions the connection.
This connection can bring on a host of problems, including malware like Trojans, worms and viruses. Additionally, the machine used for remote access is outside the tight physical security usually enforced within organizational premises. Therefore if the machine was robbed, chances are high that the network would be compromised as well.
Another potential threat could be due to an unsecured potential connection. Data transferred back and forth could be unencrypted, and therefore easily read by a port listener.