week 11

K2.11 Methods of remote access and how they protect data:

• virtual private network (VPN) – network is private and the connection is encrypted to prevent any

unauthorised access

• remote desktop protocol (RDP) (for example proprietary RDP software) – data processing occurs on

the machine being accessed, no data is transferred to the client machine

• lights-out management (LOM) – the server can be remotely managed and many tasks carried out to

address problems or unauthorised access

• secure shell (SSH) – the connection is secure, only the 2 hosts can access the data


Last Updated
2024-07-11 09:20:12

Links to Learning Outcomes

Links to Assessment criteria

 


English


Maths







How 2's Coverage





Files that support this week


| | | | |
Week 10
Prev
Week 11
Prev
Week 12
Prev

Next

Next
Webmaster Spelling Notifications