Information systems security

Information systems security

Design remote access for the company owner by updating and submitting the document from the last module with remote access solution integrated into the documents and the architecture.

  1. Read the White Paper on Securing Remote Access in the Additional Resourceshttp://resources.infosecinstitute.com/securing-remote-access/
  2. Deciding on Remote or Local Access Tutorial http://docs.oracle.com/cd/E19798-01/821-1841/gipiz/index.html
  3. Using SSH keys for remote access  http://www.lynda.com/Git-tutorials/Using-SSH-keys-remote-login/100222/111343-4.html
  4. Research VPN and the technologies needed to provide remote access athttp://www.cisco.com/c/en/us/products/collateral/security/asa-5500-series-next-generation-firewalls/prod_white_paper0900aecd804fb79a.html