week 11

K2.11 Methods of remote access and how they protect data:

• virtual private network (VPN) – network is private and the connection is encrypted to prevent any

unauthorised access

• remote desktop protocol (RDP) (for example proprietary RDP software) – data processing occurs on

the machine being accessed, no data is transferred to the client machine

• lights-out management (LOM) – the server can be remotely managed and many tasks carried out to

address problems or unauthorised access

• secure shell (SSH) – the connection is secure, only the 2 hosts can access the data


Last Updated
2024-07-11 09:20:12

English and Maths

English


Maths


Stretch and Challenge

Stretch and Challenge


  • Fast to implement
  • Accessible by default
  • No dependencies
Homework

Homework


Equality and Diversity Calendar
How to's

How 2's Coverage




Links to Learning Outcomes

Links to Assessment criteria

 


Files that support this week


| | | | |
Week 10
Prev
Week 11
Prev
Week 12
Prev

Next