Analyze access controls used to secure information systems

Assignment Help Computer Engineering
Reference no: EM133524766

Assignment: Virtual Private Network (VPN) Presentation

Course Learning Outcomes

Upon completion of this unit, students should be able to:

I. Analyze access controls used to secure information systems (IS).

• Compare virtual private network (VPN) solutions for use by remote workers.

II. Examine encryption types used for the physical security protection of an organization.

• Compare encryption types used in VPNs.
• Investigate how organizations protect data.

You have been tasked with identifying a VPN for your work organization, which is a retail company selling vehicle accessories. A VPN is needed since many of the employees work remotely and sales are conducted with dealerships and conference attendees.

You will present your findings to your company leaders in a PowerPoint presentation at the next board meeting.

Begin your task by researching at least three VPN options. These options should provide protections for employees accessing the internal network and applications. You will need to compare the features, functionality, type of encryption used, and cost of each VPN in your presentation. Which of the three options will work best for your work organization? Why? You will indicate and support your recommendation during the summary.

Your presentation must be a minimum of 10 slides, not counting the title and reference slides. You may use various sources, including your textbook. Be sure to cite and reference all sources using proper APA Style.

You must utilize the Notes feature within PowerPoint to include additional context and amplify the information for each slide. Think of the speaker notes as what your script would be if you were actually presenting this information to an audience.

Textbook: Boyle, R. J., & Panko, R. R. (2020). Corporate Computer Security (5th ed.). Pearson Education (US).

Reference no: EM133524766

Questions Cloud

How you would disseminate this information to your staff : Determine whether a record storage company would be the best option versus developing a project plan to scan the documents with remaining staff.
What lesson we can learn from the life of indigenous : What lesson we can learn from the life of Indigenous women from their past and from now their success, such as Jenn Harper, lorelei Williams, Autumn Peltier
Briefly discuss two aspects of the poor law : Briefly discuss two aspects of the Poor Law that continue in current social welfare policy - Choose one article or poem and discuss about what you read
Develop a policy and procedure on patient confidentiality : Research 4-6 recent articles on confidentiality and privacy these can be used as references. Develop a policy and procedure on patient confidentiality
Analyze access controls used to secure information systems : SEC 3302- Analyze access controls used to secure information systems (IS). Compare virtual private network (VPN) solutions for use by remote workers.
How you would disseminate this information to your staff : Explain how you would disseminate this information to your staff and how you would decide which staff to relocate to different areas of HIM and which staff
Which predator do you think will succeed in capturing : Which prey type do you think will avoid capture more often than the other prey types and Which predator do you think will succeed in capturing the most prey
Which unethical or fraudulent behavior occurred : Provide an alternative step you would have taken to address the described unethical behavior or to detect and mitigate it. Share an insight you gained from
How can we address these factors : How can we address these factors? Are boys and men predisposed to commit gender-based violence? What needs to happen to make a significant dent in the rates

Reviews

Write a Review

Computer Engineering Questions & Answers

  Explain best practices for incident response in the cloud

Discuss in 500 words or more best practices for incident response in the cloud. Refer to at least one incidence response framework.

  Discuss a few polymorphic and overloaded methods

Pick a pair of concrete classes in the JDK in a parent-child relationship and discuss a few polymorphic and/or overloaded methods.

  Write two pep-7 machine language instructions

Write two Pep/7 machine language instructions that put the value 0000000100000001 into the A register and then adds the value 0000000000000010 to it.

  Write code for the given functions

Write code for the following functions. Function void clear(Stack &s) deletes all entries and returns s as an empty Stack.

  Illustrate the differences and similarities between the

write a 200- to 300-word short-answer response to the followingwhat are the differences and similarities between

  Define how can the resistance be overcome

How can this resistance be overcome? At least 250 words in your reply. Indicate at least one source or reference in your original post.

  Calculates how many days have elapsed from january 1

Calculates how many days have elapsed from January 1 of that year to the date specified. The user enters the date from the console.

  What other tools and techniques are available to manage risk

Besides risk maps and value maps, what other tools and techniques are available to manage risk and make risk-informed decisions?

  Make an efficient object-oriented java application

while a house is chosen by the roommates, the user will give information for it. To allow extensibility, a house object can be created with no information available, address of the house only or the address of the house, monthly rent and security d..

  Explain what must happen for unix wait to return immediately

Suppose you were the instructor of a very large introductory programming class. Explain (in English) how you would use UNIX system calls to automate testing.

  Explain how a common bus can be connected

Explain how a common bus can be connected to all the register and the memory for transfer of information with the help of a meet label diagram.

  What is meant by failover time

What is meant by failover time? What are the two types of technology that support metropolitan area networks?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd