Line 10: |
Line 10: |
| |- | | |- |
| | style="backgound:#2e73b6;width:1000px;text-align:left;weight:normal;" scope="col" | | | | style="backgound:#2e73b6;width:1000px;text-align:left;weight:normal;" scope="col" | |
− | ==What is Teleworking?== | + | ==What is Remote Working?== |
− | As cloud technology, collaborative applications and internet connectivity increase, teleworking is becoming more prevalent than ever before. Teleworking is often done through the following ways: | + | As cloud technology, collaborative applications and internet connectivity increase, remote working is becoming more prevalent than ever before. Remote work is often done through the following ways: |
| | | |
| *Tunneling - using a secure communications tunnel between a device and a remote access server, usually through a VPN. | | *Tunneling - using a secure communications tunnel between a device and a remote access server, usually through a VPN. |
Line 21: |
Line 21: |
| *Remote Desktop(via RDP or VNC) - remotely control a particular host machine through the internet. | | *Remote Desktop(via RDP or VNC) - remotely control a particular host machine through the internet. |
| | | |
− | ==Threats and Challenges posed by Teleworking== | + | ==Threats and Challenges posed by Remote Working== |
| By connecting via the internet to potentially classified or sensitive applications or data, there are threats to the safety and security of that information. | | By connecting via the internet to potentially classified or sensitive applications or data, there are threats to the safety and security of that information. |
| | | |
Line 69: |
Line 69: |
| *[[:en:images/0/09/FR_-_Guide_de_démarrage_pour_participer_un_appel_Zoom.pdf|Guide de démarrage pour participer un appel Zoom - FR]] | | *[[:en:images/0/09/FR_-_Guide_de_démarrage_pour_participer_un_appel_Zoom.pdf|Guide de démarrage pour participer un appel Zoom - FR]] |
| *[https://cyber.gc.ca/sites/default/files/publications/itsp.40.111-eng_1.pdf Cryptographic Algorithms for Unclassified, Protected A and Protected B Information - ITSP.40.111] | | *[https://cyber.gc.ca/sites/default/files/publications/itsp.40.111-eng_1.pdf Cryptographic Algorithms for Unclassified, Protected A and Protected B Information - ITSP.40.111] |
| + | |- |
| + | | |
| |} | | |} |