Wednesday, July 24, 2019
Review Assignment Example | Topics and Well Written Essays - 500 words
Review - Assignment Example Most importantly, the application of secure data mechanisms such as the use virtual private networks in mobile has well been covered in the organization. Additionally, the use data encryption and decryption techniques to manage contents have effectively been applied in the organization. In general, the organization has an effective approach in management of content. As seen in the document information flow in the article has been very precise. The paper has began by outlining the research subject followed by a deep analysis of the necessity information security in an organization. The information content in the article is divided into two main segments, which are utilization of virtual private networks and a project. In the first section, it starts with an overview followed by history of VPNS, VPN technical aspects, PPTP, L2TP, IPsec, authentication and finally vulnerabilities. It is also essential to specify that the subject of vulnerabilities has addressed issues such as user threats and hardware and software threats. The second section is the project. The flow of information in the project begins with a background, materials, planning and finally implementation and testing. In essence, this a well organized flow of information in the paper. It is also vital to note that the paper contains an effective use of diagrams. This is as stipulated below. The first diagram illustrates a general application of virtual private networks in an organization using the site-to-site approach. It has been designed in a way that makes it easier for one to comprehend its ability to facilitate secure data transfer. The second diagram goes deep into the subject of VPNs by stipulating a three step tunneling approach from a client to server. There is also a diagram for secure data access in the organization. In general, the diagrams in the article have
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.