↑
Top
Last Updated
→
Next ←
Prev
Top
Week 11
K2.11 Methods of remote access and how they protect data:
• virtual private network (VPN) – network is private and the connection is encrypted to prevent any
unauthorised access
• remote desktop protocol (RDP) (for example proprietary RDP software) – data processing occurs on
the machine being accessed, no data is transferred to the client machine
• lights-out management (LOM) – the server can be remotely managed and many tasks carried out to
address problems or unauthorised access
• secure shell (SSH) – the connection is secure, only the 2 hosts can access the data
Last Updated
2024-07-11 09:20:12
English and Maths
English
Maths
Stretch and Challenge
Stretch and Challenge
Homework
Homework
Equality and Diversity Calendar
How to's
How to's Coverage
Links to Learning Outcomes |
Links to Assessment Criteria |
|
|---|---|---|
Files that support this week
→
Next ←
Prev