VPN Presentation: Secure Remote Access for JKS Accountants Staff

Verified

Added on  2023/05/23

|14
|829
|113
Presentation
AI Summary
This presentation explores the implementation of a Virtual Private Network (VPN) for JKS Accountants to facilitate secure remote access for its staff. It identifies the risks associated with staff remotely accessing client data without a VPN, such as security breaches and unauthorized data use, and highlights how a VPN mitigates these risks by providing a secure, encrypted connection. The presentation details the benefits of VPN, including reduced infrastructure costs, increased staff productivity, and enhanced data security. It also covers essential components to implement alongside a VPN, such as tunneling, encryption, firewalls, and authentication, to create a robust and secure corporate network. The conclusion emphasizes the importance of VPN for JKS Accountants in maintaining client data confidentiality and enabling flexible growth through broadband technology. Desklib provides this document and other resources for students.
Document Page
Accounting Information System
Student ID:
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
Table of Contents
Title of slide Slide no.
Introduction 3
Virtual Private Network (VPN) 4
Risks associated with staff remotely assessing client's data without VPN 6
Benefits of VPN To staff working remotely and how it mitigates risk 8
Components to implement in conjunction with a VPN 10
Conclusion 12
References 13
Document Page
Introduction
This presentation is based on the concept of
VPN network
It will focus on general risks faced by JK
accounting associated with staff working
remotely
It would help to know key components of a
corporate network
Document Page
Virtual Private Network (VPN)
Virtual private network is a secure way to connect
remote users with company network. VPN is
designed by using public wires. VPN helps to
transmit the data from company network to remote
users with proper security. VPN works as a tunnel
between remote staff and the company.
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
Protocols of VPN
Three main protocols of VPN are-
Internet protocol security or IPSec
Layer 2 tunnelling protocol ( L2TP)
Point-to-point tunnelling protocol (PPTP)
Document Page
Risks associated with staff remotely
assessing client’s data without VPN
The major risk related to it is the risk of security. Because
by using the data without VPN leads to the unauthorised use
of data. There is some data that is confidential for the
company and without VPN confidentiality of data cannot be
maintained. The company cannot rely on the staff that they
are using the data securely.
Document Page
Continued…
Another risk is investing a huge amount on the
infrastructure because if the company is not using VPN
then it is required to maintain a place where the staff can sit
and work properly and to open branches in different cities
for the remote staff. So this will require a huge investment
and this investment increases if the company wants to
grow. The operational cost of the company also increases.
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
Benefits of VPN to staff working
remotely and to mitigate risks
With the help of VPN the
staff working remotely feels
like they were sitting in the
company only. VPN helps
the remotely working staff
to connect with the network
of JKS from anywhere in the
world. VPN transmits the
data with proper security so
chances of unauthorised use
of data reduces.
Document Page
Continued…
VPN also helps in reduction in the expenses of leased space
by offering remote staff to work from home. So the company
is not required to open different branches. Reduces the
chances of getting stuck in traffic: Working from home will
help the remote staff to get rid of wasting 1-2 hours in traffic
to reach office and going back to home.
Document Page
Components to implement with a
VPN network
Tunnelling :VPN acts as a tunnel between company and the
staff working remotely.
Encryption :Encryption means encoding the data in such a
way that it can be used and read by a computer with right
decoder to prevent misuse of information.
Encapsulation: For encapsulation, VPN relies on either of
following technologies i.e. GRE, IPSec, L2F, PPTP, and
L2TP
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
Continued…
Firewall: Firewall secures the data
communications with multiple parallel VPN.
Authentication: Authentication identifies
whether the data is used by only authorised
users.
Document Page
Conclusion
At the end it is concluded that VPN is beneficial for JKS in many ways.
JKS is maintaining client’s data confidential so JKS requires security
software that maintains its information confidential and restricts the
unauthorised use of data. So VPN is a best practice to adopt for this
company according to its benefits and risk mitigations as discussed
above. Some of its benefits are it reduces long distance leased lines,
telephone charges. VPN leads to flexibility of growth and efficiency
with broadband technology.
Document Page
References
Oriental Computer Integrated Services (2016). VPN
Implementation. Retrieved from:
http://oriental-cis.com/Infrastructure.aspx?PID=48&lang=en
Techtweakerz (2017). Benefits of Virtual Private Networks
(VPNs). Retrieved from:
http://www.techtweakerz.com/1010-2/
Rao Vallabhaneni, S. (2015). ‘Wiley CIAexcel Exam Review
2016 Focus Notes: Part 3, Internal Audit Knowledge
Elements’. USA: John Wiley & Sons.
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
Continued…
Vishwakarma, A. (2016). ‘Virtual Private Networks’, In
Network Security Attacks and Countermeasures, 78-
114.
Bhat, A.Z., Al Shuaibi, D.K. and Singh, A.V. (2016).
‘Virtual private network as a service—A need for
discrete cloud architecture’, In Reliability, Infocom
Technologies and Optimization (Trends and Future
Directions)(ICRITO), 526-53.
chevron_up_icon
1 out of 14
circle_padding
hide_on_mobile
zoom_out_icon
logo.png

Your All-in-One AI-Powered Toolkit for Academic Success.

Available 24*7 on WhatsApp / Email

[object Object]