Secure Remote Access: VPN Benefits for JKS Accounting in Sydney

Verified

Added on  2023/06/16

|13
|864
|310
Presentation
AI Summary
This presentation addresses the need for secure remote access at JKS Accounting, outlining the benefits of implementing a Virtual Private Network (VPN). It begins by defining VPNs and their role in securing private and public networks, particularly for corporations handling sensitive data. The presentation then highlights the risks JKS Accounting faces without a VPN, including man-in-the-middle attacks, DDoS vulnerabilities due to unsecured end-user devices, and the risk of data breaches when employees work remotely. Subsequently, it details the advantages of VPN implementation, such as connecting remote sites, reducing overhead costs by enabling remote work, providing emergency data recovery, and enhancing overall security for the company and its employees. Finally, the presentation touches upon other network access security methods like Access Control Lists (ACL), IP filtering, and encryption/decryption to provide a comprehensive security strategy for JKS Accounting.
Document Page
Accounting Information System
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
Table of content
Title of slide Slide number
VPN 3
Risk faced by JKS accounting while not using VPN 4
Benefits of JKS Accounting implementing a VPN 8
Methods of network access security 11
References 13
Document Page
1. VPN
Virtual Private Network (VPN) is a method
used to add security and privacy to private
and public network, like internet and Wi-Fi
Hotspot (Sainuk, et al., 2014). VPN is
mostly used in corporation to protect
sensitive data. With the help of VPN,
employees can access corporate internet
while located outside the office.
Document Page
2. Risk faced by JKS accounting while not using VPN:
With major advancement of mobile
technology, remote employee security has
become more critical than ever. There are
some risks faced by JKS are discussed
below:
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
Risk of man in middle:
If the employees of JKS will not use any
secure authentication protocol than man in
the middle attacks are possible. This attack
needs to interpose itself between the VPN
server and the remote user.
Document Page
DDoS:
End user devices (i.e. mobile, laptop,
tablets etc.) have little security. So these
devices can be easier target than corporate
network. Unsecured devices are open for
viruses, password harvesting and worms,
which can easily lead to a service attack
(Armstrong, et al., 2013). VPN can protect
these devices through malicious traffic into
the corporate network.
Document Page
Risk of data sharing:
Remote employees work from outside of
the office so without using VPN it can be
happen that the data can be hacked by
another person and he can misuse that
data.
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
3. Benefits of JKS Accounting implementing a VPN:
Connecting remote sites:
VPN tunnels not only allow individual
workstation to connect into the network,
but with the help of these tunnels entire
remote location can access the LAN. VPN
connection between two sites creates a
WAN and allows two networks, in two
separate physical locations to
communicate.
Document Page
Less overhead:
In today’s world the number of remote
workers is growing. These remote workers
working from home and utilize VPN
connections into a central database (Zhou,
2011). VPN connection helps JKS’s workers
to work from home and this helps in cost
reduction of office and other expenses for
JKS.
Document Page
Emergencies:
VPN provide recovery facility to companies
so companies can recover their data in
case of emergency. This recovery facility of
VPN increasing its importance for
companies.
VPN provide security to the company
and employees:
VPN provide security to company and its
remote employees. With the help of VPN
remote employee can easily transfer data
with company and share confidential data.
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
4. Methods of network access security:
ACL:
ACL mean Access Control List. It is a rule which applied to
a router interface, that specifies denied and permitted
traffic. ACL used with a firewall and router system to
refer the list of permitted users and computers. With the
help of ACL only those users that listed in permitted list
can use access the data and can use the network of a
company.
IP Filtering:
The IP filtering, normally associated with the routers is
the processes of configuring a device to pass only
through the desired IP traffic and its block everything
else (Chen and zhao, 2012). Only those users whose IP
address is filtered can access the network.
Document Page
Encryption and decryption:
Encryption is a process by which a readable
data converted into an unreadable form so
any third party cannot use that data and
authorized party can decrypt it (Zhou, et
al., 2013). Decryption is a process of
converting encrypted data into its original
form.
chevron_up_icon
1 out of 13
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]