COMPARISON BETWEEN TOOLS
- Authentication compares the method that each tool uses to authenticate the users in remote accessing each other's computers.
- Access Control is the accessibility limits and options available for each tool.
- Data Confidentiality reflects the type of information that is being exposed to the authorized parties.
- Data Integrity compares the accuracy of information that is being shared and accessed remotely.
- Non-Repudiation compares the information traced from the users during the remote access.
In conclusion, the best software tools that fulfils the security principles of confidentiality, integrity and availability for remote access is SupRemo. Confidentiality shown by SupRemo is limiting the location of available disks for file transfers. It is important to restrict some access in respect to user’s privacy. Moreover, the integrity of SupRemo can be seen by allowing multi-platform accessibility which is useful for consistent access across different operating system. Lastly, the availability of data is well-managed within SupRemo due to the ability to transfer files and folders, as well as access gained towards unattended computers and serves as set by the users. This ensures convenience when dealing with data.

Comments
Post a Comment