Modems and Other Backdoors

Another way organizations extend access to their networks is through modems. Some organizations maintain modem pools with special servers that secure and maintain connections with these external users. Others install modems on special servers that give access to a minimal set of users. Regardless of the method used, the common denominator is that the administrators manage modem access centrally.

Security professionals see the central management of modems key to managing these transient access devices. This way, they can be monitored and controlled while continuing to offer the service. What they want to avoid are allowing modems to be installed elsewhere on the network. A modem installed on a user’s system that is ...

Get Writing Information Security Policies now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.