Remote Access: Spacedesk

Security Tool: Spacedesk 


Introduction 

Remote access is the ability for an authorized person to access a remote computer, server, or network from a geographical distance through a network connection. Two or more computers/ network nodes that are on separate networks or in different geographical locations can be connected. It enables remote users to access files and other system resources on any devices or servers. Remote access is accomplished with a combination of software, hardware, and network connectivity.

An example of access control tool is Spacedesk. Spacedesk provides function that enable multi monitor display. To utilize this function, at least two machines are required. All machines need to be connected to a LAN (Local Area Network) supported by TCP/IP network protocol. There is additional graphics adapter or display connector that help in mirror any other Windows display screen or extend the Windows Desktop. The screen content on Primary Machine is captured, compressed, and transmitted over the LAN to other remote machines.


       Installation Manual

1. The software installer can be download from the link: https://www.spacedesk.net/ 
    Download the installer as PRIMARY PC (Server) 


2. Run the installer.


3. Tick the checkbox to “Add an exception ­to the Windows firewall for spacedesk”.


4. Proceed the installation until finish.


5. Download and install the client application in mobile devices or another computers.


Usage Demo Manual

1. Run the server.



2. Run the client in client devices using the same Wi-Fi connection. 

    Click the IP address of the primary PC.



3. Enter the IP address manually if the IP address not being shown in the list.



4. The client has been connected to the server and able to take control and access server's data. 



Analysis on CIA

Confidentiality

Client machines need IP address of server machine to access to the remote machine. The IP address is validated by the client driver, user can access data and take control after the validation is successful. This access of unauthorized parties is prevented.

 

Integrity

Client machines able to make changes on all data in the remote machine. The sensitive data is not protected with additional security rules decrease the trustworthiness of the data.

 

Availability

Client machine can always connect and disconnect to the remote machine after validated the IP address of the remote machine. The remote machine needs to be turn on to establish the connection.

Comments