week 11
K2.11 Methods of remote access and how they protect data:
• virtual private network (VPN) – network is private and the connection is encrypted to prevent any
unauthorised access
• remote desktop protocol (RDP) (for example proprietary RDP software) – data processing occurs on
the machine being accessed, no data is transferredââ¬Â¯to the client machine
• lights-out management (LOM) – the server can be remotely managed and many tasks carried out to
address problems or unauthorised access
• secure shell (SSH) – the connection is secure, only the 2 hosts can access the data
Last Updated
2024-07-11 09:20:12
English and Maths
English
Maths
Stretch and Challenge
Stretch and Challenge
- Fast to implement
- Accessible by default
- No dependencies
Homework
Homework
Equality and Diversity Calendar
How to's
How 2's Coverage
Links to Learning Outcomes |
Links to Assessment criteria |
|
---|---|---|
Files that support this week
Week 10←
PrevWeek 11←
PrevWeek 12←
Prev→
Next