AUMC Chapter 20 Cryptography and Network Security Principles and Practice Discussion Post
Description
Having Trouble Meeting Your Deadline?
Get your assignment on AUMC Chapter 20 Cryptography and Network Security Principles and Practice Discussion Post completed on time. avoid delay and – ORDER NOW
After reading chapter 20, analyze how a VPN is used for telework and how it helps to keep data safe . The initial post must be completed by Thursday at 11:59 eastern. You are also required to post a response to a minimum of two other student in the class by the end of the week. You must use at least one scholarly resource. Every discussion posting must be properly APA formatted.
Your responses to other students must be more than a simple “Good job” or “I agree with your post”. They must also not just be “Let me add to your post…” Instead, your responses to each other should do three things:
1. Acknowledge the other student’s post with some form of recognition about what they posted
2. Relate their posting to something you have learned or are familiar with
3. Add to the conversation by asking additional questions about their post, or discussing their topic further
POST 1
Virtual private network (VPN) is software that can be used to access data remotely and facilitates control over the data and allows people to work. it is an easy way to make the connection between management and employees. it can take place by connecting other networks with the use of the internet. It allows users to securely access and keeps private data security. VPNs are used to keep data safe. Some key points help to keep data secure. They can be explained as follows. It is used to create a tunnel for encrypted data. It is used for telework. It can be described as follows. Device control is one of the connections which is used in telework. In every organization it keeps its network secured (Buc?a, 2020).
It ensures that another to providing secure teleworking. It allows employees to access it. Access control is another component that is used by VPN in teleworking. Remote access to information can take place within the use of identity verification. It creates security along with the authentication factors which are used to make sure identity theft. Managing permissions and roles is another aspect of making use of access control. VPNs are used to make security to data. It keeps public internet connections secure. It can occur with the use of encrypting users information and it prevents by shielding users online activity. This activity is not possible to theft or any cybercrimes. It protects data from cybercriminals (Scarfone, Greene & Souppaya, 2020).
POST 2
Working from home is one of the bonuses that many companies provide to employees to help sweeten the deal. The recent coronavirus outbreak has only added to this, prompting many more companies to allow their staff to work from home. Remote access VPNs are used by businesses to create a secure connection between their network and the devices that remote workers utilize. Employees can access network resources as if their devices were physically plugged in at the office once they are connected. A remote access VPN connects an employee’s device to the company’s network via a virtual tunnel. The data transferred back and forth over this tunnel travels over the public internet, but it is secured by encryption and security procedures to help keep it private and secure. A network access server and VPN client software are the two basic components of this form of VPN. A dedicated network access server or a software application operating on a shared server can both be used as a network access server. To use a remote access VPN, users connect to the NAS over the internet. (Spadafora, 2020)
To access the servers securely and the data in your datacenter or your office is possible with the use of a properly built VPN. Many companies have either implemented or are in the process of implementing a work-from-home strategy to encourage employees to stay at home during the COVID-19 outbreak. An encrypted tunnel is an essential component of all VPN types. Encryption and tunneling protocols come in a variety of forms. A VPN also connects to a client, which requires the user to verify each time for security reasons. VPN further reduces the risk of data leaks by assigning each user and website a unique IP address, which is discovered using a DNS server. It establishes a secure connection from any location while also avoiding annoying adverts. VPNs are a useful tool, but they are not a cloak of anonymity. (Stornelli, 2020)