Information systems security
Design remote access for the company owner by updating and submitting the document from the last module with remote access solution integrated into the documents and the architecture.
- Read the White Paper on Securing Remote Access in the Additional Resourceshttp://resources.infosecinstitute.com/securing-remote-access/
- Deciding on Remote or Local Access Tutorial http://docs.oracle.com/cd/E19798-01/821-1841/gipiz/index.html
- Using SSH keys for remote access http://www.lynda.com/Git-tutorials/Using-SSH-keys-remote-login/100222/111343-4.html
- Research VPN and the technologies needed to provide remote access athttp://www.cisco.com/c/en/us/products/collateral/security/asa-5500-series-next-generation-firewalls/prod_white_paper0900aecd804fb79a.html
Leave a Reply
Want to join the discussion?Feel free to contribute!