VPN Implementation: Secure Remote Access for JKS Accountants Network

Verified

Added on  2023/06/16

|13
|384
|69
Presentation
AI Summary
This presentation addresses the Managing Partner of JKS Accountants' need to evolve their corporate network for remote access while maintaining data confidentiality. It defines a Virtual Private Network (VPN), explains how it enables secure remote access, and outlines critical functions like authentication, access control, confidentiality, and data integrity. The presentation identifies risks associated with remote access without a VPN, such as data theft and external intrusion, and highlights the advantages of implementing a VPN, including cost savings and scalability. It concludes that VPN usage would be highly beneficial for JKS Accountants. Desklib provides students with access to this and many other solved assignments.
tabler-icon-diamond-filled.svg

Contribute Materials

Your contribution can guide someone’s learning journey. Share your documents today.
Document Page
Virtual Private Network
Name of the Student:
Name of the University:
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
Introduction
The managing partner of the JKS company is
looking to evolve their corporate network.
They want to allow their staffs to work
remote from home.
For maintaining the confidentiality the
managing partner wants to minimize the risk.
Document Page
What is VPN ?
A virtual private network extends the private
network
It enables the users send or receive the data
across the networks
It allows the employees to incorporate with
the network outside the office
Document Page
What is VPN ?
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
Brief overview of how it works
Connection are made in between the internet
and the VPN
Connections are made via the datagram
VPN allows the authentic users entry through
the firewall.
The protocols for the VPN are used for
creating a tunnel.
Document Page
Critical Functions
Authentication
Access Control
Confidentiality
Data Integrity
Document Page
Risks Involved with the JKS Accounting
System
The staffs are in the threat of the data being
stolen.
The data integrity of the system is also at risk
External intrusion might affect the system.
The security failure can also prevent the
users from making connections to other sites.
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
Advantages of implementing VPN
Cost Saving
Scalability
Document Page
Cost Saving
Eliminates the extra costs for the company
Saves the operational costs
Reduces the telephone and the fax charges
for the company
Reduces the data transfer charges
Document Page
Scalability
Flexibility of growth
Efficiency with broadband technology
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
Conclusion
For conclusion it can be said that the use of
VPN would very helpful for the company and
it should be utilized in every way possible.
Document Page
Bibliography
Linslal, C. L., Kailasnath, M., Mathew, S., Nideep,
T. K., Radhakrishnan, P., Nampoori, V. P. N., &
Vallabhan, C. P. G. (2016). Tuning whispering
gallery lasing modes from polymer fibers under
tensile strain. Optics letters, 41(3), 551-554.
Peter, J., Vallabhan, C. P. G., Radhakrishnan, P.,
Nampoori, V. P. N., & Kailasnath, M. (2014). ASE
and photostability measurements in dye doped
step index, graded index and hollow polymer
optical fiber. Optics & Laser Technology, 63, 34-
38.
Document Page
chevron_up_icon
1 out of 13
circle_padding
hide_on_mobile
zoom_out_icon
logo.png

Your All-in-One AI-Powered Toolkit for Academic Success.

Available 24*7 on WhatsApp / Email

[object Object]