How can pki certificate secure an remote work environment

Assignment Help Management Information Sys
Reference no: EM133394280

Assignment:

How can PKI Certificate help secure an Remote work environment? Can PKI verify a OS minimum while the remote user is connection to VPN. I.E a user is home, remoting into the company's network through VPN, but their computer is on Windows 10 1709 when the network requires all devices, at a minimum be on Windows 10 21H1. Can PKI help verify users antivirus status? I.E a user is home, remoting into the company's network through VPN, but their computer Windows defender is turned off, when the network requires all computer to have some from of antivirus. Can PKI certs help verify theses things while over a VPN?

Reference no: EM133394280

Questions Cloud

Do you agree with this type of surveillance : Name and describe/define two laws that give government agencies broad surveillance powers.
How a new system would affect user workflow : How would you address concerns pertaining to how a new system would affect user workflow.
Identify a plan to address cybersecurity risk : Your first order of business is to identify, quantify, and propose a plan to address cybersecurity risk across the enterprise. ABC Inc.
What are key elements of generic qualitative inquiry : What are key elements of generic qualitative inquiry. How does generic qualitative inquiry support digital age influenc in information technology.
How can pki certificate secure an remote work environment : How can PKI Certificate help secure an Remote work environment? Can PKI verify a OS minimum while the remote user is connection to VPN.
Discuss tools for a group of non-tech savvy corporate people : Summarize current state "as if" you are discussing these tools for a group of non-tech savvy corporate people.
What physical security solutions does your group propose : What physical security solutions does your group propose? what are the limitations of those solutions?
Create a project plan for the attack : Create a project plan for the attack, including targets to achieve the objectives and methods for acquiring information about those targets.
Scenario-controversies involving google privacy policy : Google Inc., perhaps the most well-known search engine company in the world, also owns and/or operates several subsidiary services and Web-based applications.

Reviews

Write a Review

Management Information Sys Questions & Answers

  Explain about technology trendsexplain the process in

explain about technology trendsexplain the process in detail? i use the internet but is there some other official way

  Discuss the value of planning in the integration technology

Your CEO has asked you to compile some best practices, create a plan, and present them to Senior Management.

  Create a mock-up interface for the project

Create a mock-up interface for the project. Use at least 3 user interface design techniques. Ensure that the interface can track information (e.g., name, aliases, location, nationality, product, price, picture, notes, quantity, street address, etc..

  Explian what are your retailer profits for each stock level

What are your retailer profits for each stock level? Supplier profits for each stock level? Supply chain total for each stock level?

  What will you tell the president and what will you do

How will you approach this situation? Obviously you would not do the work as outlined in the request. You need to understand what the president thinks he wants. You need to convince the president to allow you to follow the recognized organized pr..

  What specific items should be included in an ethics program

What specific items should be included in an ethics program in order to attract clients and good employees?

  What do the media say about the rules for relationships

Do the popular media approve of certain types of relationships and not others? How do the media "define" friendship, love, and family? What do the media say about the rules for relationships?

  Addresses computer-aided data analysis tools

analysis tools and services available to fraud examiners - Association of Certified Fraud Examiners'

  Determine whether the sla still applies or becomes invalid

Determine whether the SLA still applies or becomes invalid. Propose what the organization should do to maintain the service delivery.

  Explain about a service-oriented architecture

Question about information systems management - Explain about a Service-Oriented Architecture (SOA)? How is SOA an improvement on older architectures? Explain how SOA relates to web services

  What myra need to do to prepare her employees to use system

What will Myra need to do to prepare her employees to use the new system? Who will use the system and for what purposes? When users have questions about how to use the system, how will they get answers?

  How do you draw the erd

Georgia Gwinnett College opened on August 18, 2006 as one of the nation's first four-year public college founded in the 21st century.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd