JKS Accountants: Benefits of VPN for Remote Work & Data Security

Verified

Added on  2023/05/23

|14
|879
|437
Presentation
AI Summary
This presentation explores the implementation of a Virtual Private Network (VPN) for JKS Accountants to enhance network security and facilitate secure remote access for staff. It defines VPN technology, highlighting its role in creating encrypted and secure connections over less secure networks like the internet. The presentation outlines the risks faced by JKS Accounting when staff remotely access client data without a VPN, including data theft and system hacking. It details the benefits of VPN implementation, such as improved security, privacy, and the ability to securely connect dispersed corporate networks. Furthermore, the presentation suggests additional components like customer VPN software, firewalls, routers, VPN appliances, and servers to enhance VPN efficiency and security. The conclusion emphasizes the importance of VPN adoption for JKS Accounting to ensure secure remote data access for both staff and clients.
tabler-icon-diamond-filled.svg

Contribute Materials

Your contribution can guide someone’s learning journey. Share your documents today.
Document Page
Accounting Information System
Virtual Private Network
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
Introduction
This presentation aims to discuss about a
Virtual Private Network, (VPN).
Cindy heard about the VPN but was not sure
what it was exactly.
However, she had intentions to evolve the
corporate network for the JKS Accountants so
that the staff would work freely and interact
with the clients without travelling to the
workplace.
Document Page
Virtual Private Network
A VPN refers to the type of technology which
forms an encrypted and secure connection over
a network which is less secured (Bahnasse &
Elkamoun, 2015).
The internet can be viewed as an example of the
technology.
Therefore, through a VPN, users in the remote
areas as well as the local offices have the
opportunity to access the business applications.
Document Page
A VPN
In addition, the staff can access the Company
resources remotely.
Secure connections are facilitated using the VPN
which allows the private connections be linked
using the internet.
Therefore, the distant computers serve as if they
are on a similar local and secure network.
An example of a VPN Is the SSL, or Secure Socket
Layer.
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
Risks Experienced by JKS Accounting
JKS Accounting may be faced with various risks
which occur due to the remote access of data
by the staff without using the VPN as outlined
in this presentation.
For instance, the Company data can be
deleted or stolen hence will impact the
individuals’ livelihoods and also cost the
organization (Ismail, 2013).
Document Page
Risks Experienced by JKS Accounting
JKS Accountants risks having other people
access the system in which they connect
remotely without using the VPN.
There may be intruders dialing in the network
and the corporate system is at risk of been
hacked (Sharma & Yadav, 2015).
Intruders may find access to the crack system
where they can acquire the phone number
which may lead them to trace the line.
Document Page
Benefits of Using a VPN
JKS Accounting can protect their files from the
attackers since the VPNs facilitate security and
privacy.
The VPN allows the staff to connect into the
public network and access the corporate data
remotely.
Using the VPN, the staff and the clients can
protect their documents which may be considered
in the future plans of the organization.
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
Mitigating Risks Using a VPN
JKS Accounting can mitigate risks using the VPN
since it provides an opportunity to route the
traffic securely.
The staff can connect several corporate
networks which are dispersed and hence access
the corporate data without visiting the office
(Monaghan & Hunter, 2012).
The organization has the opportunity to harden
the VPN safety measures to evade the risks.
Document Page
Other Components
The JKS Accounting needs to implement other
components inconjuntion with the VPN for efficiency
and attain a secure network.
For instance, they should use software for customer’s
VPN to ensure the remote connection is protected
(Sinha, 2017).
Another way, they should create firewalls and routers
which recognize the VPN to allow legitimate traffic
which is associated with the VPN to pass without
limit.
Document Page
Other Components
Other requirements for the VPN are the VPN
appliances or concentrators who can manage
the traffic associated with the VPN.
In addition, the servers are required to handle
the sessions for VPN as well as their way in to
the corporate system resources (Liyanage,
Ylianttila & Gurtov, 2014).
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
Conclusion
Clearly, it is important if the JKS Accounting
employs the VPN since they will attain various
benefits.
The staff and the clients will as well benefit
from using the VPN, and they can access the
corporate data remotely in a secure
connection.
Document Page
References
Liyanage, M., Ylianttila, M., & Gurtov, A. (2014). IP-based virtual
private network implementations in future cellular
networks. Handbook of Research on Progressive Trends in Wireless
Communications and Networking, 1(44), 18.
Ismail, M. N. (2013). Study the best approach implementation and
codec selection for VoIP over virtual private network.
Document Page
References
Bahnasse, A., & Elkamoun, N. (2015). Study and
evaluation of the high availability of a Dynamic
Multipoint Virtual Private Network. Revue
MéDiterranéEnne Des
TéLéCommunications, 5(2).
Monaghan, J., & Hunter, D. I. (2012). U.S. Patent
No. 8,102,758. Washington, DC: U.S. Patent
and Trademark Office.
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
References
Sinha, S. (2017). Virtual Private Network or VPN. In Beginning
Ethical Hacking with Python (pp. 185-189). Apress.
Sharma, T., & Yadav, R. (2015). Security in virtual private
network. International Journal of Innovations & Advancement
in Computer Science, 4, 669-675.
chevron_up_icon
1 out of 14
circle_padding
hide_on_mobile
zoom_out_icon
logo.png

Your All-in-One AI-Powered Toolkit for Academic Success.

Available 24*7 on WhatsApp / Email

[object Object]