Academic Integrity: tutoring, explanations, and feedback — we don’t complete graded work or submit on a student’s behalf.

Wilke\'s IT manager appreciates how clearly you explained each WAN connectivity

ID: 3639297 • Letter: W

Question

Wilke's IT manager appreciates how clearly you explained each WAN connectivity option. Then she adds another requirement for the connections that link employees who work from the road and at home: security. Because the firm works on government contracts, it must follow strict privacy regulations to protect the data it gathers and reports. The IT manager is concerned that using a telephone line to dial into a remote access server, for example, leaves the data vulnerable to snooping. She also wonders how secure home-based broadband connections really are. What can you tell her about ensuring secure connections from home and mobile users, as well as which protocols are preferred over others?

Explanation / Answer

Encryption protocols exist that can be implemented in software to secure communications across any line, including home telephone and broadband. An application can contain built-in encryption, which would make the data fed to the interface card unreadable to anyone but the intended recipient. Alternatively, a secure tunnel such as a VPN or SSH Tunnel could be established within which communications are encapsulated and transmitted securely. There are several encryption schemes available for both VPN and SSH solutions, typically schemes with higher key lengths are more secure. RSA is an example of an encryption algorithm which has a variable key length.

Hire Me For All Your Tutoring Needs
Integrity-first tutoring: clear explanations, guidance, and feedback.
Drop an Email at
drjack9650@gmail.com
Chat Now And Get Quote