Top

Week 11

K2.11 Methods of remote access and how they protect data:

• virtual private network (VPN) – network is private and the connection is encrypted to prevent any

unauthorised access

• remote desktop protocol (RDP) (for example proprietary RDP software) – data processing occurs on

the machine being accessed, no data is transferred to the client machine

• lights-out management (LOM) – the server can be remotely managed and many tasks carried out to

address problems or unauthorised access

• secure shell (SSH) – the connection is secure, only the 2 hosts can access the data


Last Updated
2024-07-11 09:20:12

English and Maths

English


Maths


Stretch and Challenge

Stretch and Challenge


Homework

Homework


Equality and Diversity Calendar
How to's

How to's Coverage





Links to Learning Outcomes

Links to Assessment Criteria

 


Files that support this week


| | | | |

Next

Prev