Analyze access controls used to secure information systems

Assignment Help Computer Engineering
Reference no: EM133524766

Assignment: Virtual Private Network (VPN) Presentation

Course Learning Outcomes

Upon completion of this unit, students should be able to:

I. Analyze access controls used to secure information systems (IS).

• Compare virtual private network (VPN) solutions for use by remote workers.

II. Examine encryption types used for the physical security protection of an organization.

• Compare encryption types used in VPNs.
• Investigate how organizations protect data.

You have been tasked with identifying a VPN for your work organization, which is a retail company selling vehicle accessories. A VPN is needed since many of the employees work remotely and sales are conducted with dealerships and conference attendees.

You will present your findings to your company leaders in a PowerPoint presentation at the next board meeting.

Begin your task by researching at least three VPN options. These options should provide protections for employees accessing the internal network and applications. You will need to compare the features, functionality, type of encryption used, and cost of each VPN in your presentation. Which of the three options will work best for your work organization? Why? You will indicate and support your recommendation during the summary.

Your presentation must be a minimum of 10 slides, not counting the title and reference slides. You may use various sources, including your textbook. Be sure to cite and reference all sources using proper APA Style.

You must utilize the Notes feature within PowerPoint to include additional context and amplify the information for each slide. Think of the speaker notes as what your script would be if you were actually presenting this information to an audience.

Textbook: Boyle, R. J., & Panko, R. R. (2020). Corporate Computer Security (5th ed.). Pearson Education (US).

Reference no: EM133524766

Questions Cloud

How you would disseminate this information to your staff : Determine whether a record storage company would be the best option versus developing a project plan to scan the documents with remaining staff.
What lesson we can learn from the life of indigenous : What lesson we can learn from the life of Indigenous women from their past and from now their success, such as Jenn Harper, lorelei Williams, Autumn Peltier
Briefly discuss two aspects of the poor law : Briefly discuss two aspects of the Poor Law that continue in current social welfare policy - Choose one article or poem and discuss about what you read
Develop a policy and procedure on patient confidentiality : Research 4-6 recent articles on confidentiality and privacy these can be used as references. Develop a policy and procedure on patient confidentiality
Analyze access controls used to secure information systems : SEC 3302- Analyze access controls used to secure information systems (IS). Compare virtual private network (VPN) solutions for use by remote workers.
How you would disseminate this information to your staff : Explain how you would disseminate this information to your staff and how you would decide which staff to relocate to different areas of HIM and which staff
Which predator do you think will succeed in capturing : Which prey type do you think will avoid capture more often than the other prey types and Which predator do you think will succeed in capturing the most prey
Which unethical or fraudulent behavior occurred : Provide an alternative step you would have taken to address the described unethical behavior or to detect and mitigate it. Share an insight you gained from
How can we address these factors : How can we address these factors? Are boys and men predisposed to commit gender-based violence? What needs to happen to make a significant dent in the rates

Reviews

Write a Review

Computer Engineering Questions & Answers

  Mathematics in computing

Binary search tree, and postorder and preorder traversal Determine the shortest path in Graph

  Ict governance

ICT is defined as the term of Information and communication technologies, it is diverse set of technical tools and resources used by the government agencies to communicate and produce, circulate, store, and manage all information.

  Implementation of memory management

Assignment covers the following eight topics and explore the implementation of memory management, processes and threads.

  Realize business and organizational data storage

Realize business and organizational data storage and fast access times are much more important than they have ever been. Compare and contrast magnetic tapes, magnetic disks, optical discs

  What is the protocol overhead

What are the advantages of using a compiled language over an interpreted one? Under what circumstances would you select to use an interpreted language?

  Implementation of memory management

Paper describes about memory management. How memory is used in executing programs and its critical support for applications.

  Define open and closed loop control systems

Define open and closed loop cotrol systems.Explain difference between time varying and time invariant control system wth suitable example.

  Prepare a proposal to deploy windows server

Prepare a proposal to deploy Windows Server onto an existing network based on the provided scenario.

  Security policy document project

Analyze security requirements and develop a security policy

  Write a procedure that produces independent stack objects

Write a procedure (make-stack) that produces independent stack objects, using a message-passing style, e.g.

  Define a suitable functional unit

Define a suitable functional unit for a comparative study between two different types of paint.

  Calculate yield to maturity and bond prices

Calculate yield to maturity (YTM) and bond prices

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd