Changes

Jump to navigation Jump to search
no edit summary
Line 10: Line 10:  
|-
 
|-
 
| style="backgound:#2e73b6;width:1000px;text-align:left;weight:normal;" scope="col" |
 
| style="backgound:#2e73b6;width:1000px;text-align:left;weight:normal;" scope="col" |
==What is Teleworking?==
+
==What is Remote Working?==
As cloud technology, collaborative applications and internet connectivity increase, teleworking is becoming more prevalent than ever before. Teleworking is often done through the following ways:
+
As cloud technology, collaborative applications and internet connectivity increase, remote working is becoming more prevalent than ever before. Remote work is often done through the following ways:
    
*Tunneling - using a secure communications tunnel between a device and a remote access server, usually through a VPN.
 
*Tunneling - using a secure communications tunnel between a device and a remote access server, usually through a VPN.
Line 21: Line 21:  
*Remote Desktop(via RDP or VNC) - remotely control a particular host machine through the internet.
 
*Remote Desktop(via RDP or VNC) - remotely control a particular host machine through the internet.
   −
==Threats and Challenges posed by Teleworking==
+
==Threats and Challenges posed by Remote Working==
 
By connecting via the internet to potentially classified or sensitive applications or data, there are threats to the safety and security of that information.
 
By connecting via the internet to potentially classified or sensitive applications or data, there are threats to the safety and security of that information.
   Line 69: Line 69:  
*[[:en:images/0/09/FR_-_Guide_de_démarrage_pour_participer_un_appel_Zoom.pdf|Guide de démarrage pour participer un appel Zoom - FR]]
 
*[[:en:images/0/09/FR_-_Guide_de_démarrage_pour_participer_un_appel_Zoom.pdf|Guide de démarrage pour participer un appel Zoom - FR]]
 
*[https://cyber.gc.ca/sites/default/files/publications/itsp.40.111-eng_1.pdf Cryptographic Algorithms for Unclassified, Protected A and Protected B Information - ITSP.40.111]
 
*[https://cyber.gc.ca/sites/default/files/publications/itsp.40.111-eng_1.pdf Cryptographic Algorithms for Unclassified, Protected A and Protected B Information - ITSP.40.111]
 +
|-
 +
|
 
|}
 
|}

Navigation menu

GCwiki