Andy Kolden

Information Security

Chapter 6 (pages 382-383)




1)      Using the Internet, determine what applications are commercially available to enable a secure remote access to a PC.

-          TeamViewer, (Microsoft) Remote Desktop Connection, AnyDesk, RemoteUtilities, UVNC, Real VNC.  These are all of the top rated remote access applications that are available commercially.  (


2)      Using the Web, search for “software firewalls.”  Examine the various alternatives available and compare their functionality, costs, features, and type of protection.  Create a weighted ranking according to your own evaluation of the features and specs of each software package. 

-          Cisco: 1st

-          FortiGate: 2nd

-          SonicWall: 3rd

-          Juniper: 4th

-          I have these in this order off of list price, features and other people’s reviews.  It seems that if you are going to have a more advanced software firewall, then the more you have to pay.  The nicer firewalls are more expensive and they have very good protection judging off of people’s reviews.  It also depends if the firewall is for a business or just an individual because they are much more expensive (obviously) if it is for a business but also much more advanced.


Case Exercises

1)      What questions do you think Kelvin should have included on his slide to start the discussion?

-          What kind of security protection do we want?

-          Do we want it to be the best and most protection possible?

-          Is it in the budget for our company to do this?

-          Are we able to produce a security frame like this?


2)      If the questions were broken down into two categories, they would be cost versus maintaining high security while keeping flexibility.  Which is more important for SLS?

-          More importance would have to lean on the higher security maintenance side of things.  This is because of them already being hacked into before and for the fact that they will be much more protected in the case of an emergency like this happening again to them.


Ethical Decision Making

1)      Is it unethical to produce a consulting report that steers a client toward a specific outcome?

-          I think it is because in this case she is trying to make more money with the more expensive and more complex design that take more time to build and much more time to maintain.  In this case it is unethical but she is also proving the best security.


2)      Would she be ethically sound to urge reconsideration of such a decision?

-          Yes she would be just because she truthfully believes that the better option that has a much better security success rate is the more expensive.  She would do what she could to make sure that the company had the best security that they needed after already being hacked.