K2.11 Methods of remote access and how they protect data:
• virtual private network (VPN) – network is private and the connection is encrypted to prevent any
unauthorised access
• remote desktop protocol (RDP) (for example proprietary RDP software) – data processing occurs on
the machine being accessed, no data is transferred to the client machine
• lights-out management (LOM) – the server can be remotely managed and many tasks carried out to
address problems or unauthorised access
• secure shell (SSH) – the connection is secure, only the 2 hosts can access the data
Links to Learning Outcomes |
Links to Assessment criteria |
|
---|---|---|