| Line 10: | Line 10: | 
|  | |- |  | |- | 
|  | | style="backgound:#2e73b6;width:1000px;text-align:left;weight:normal;" scope="col" | |  | | style="backgound:#2e73b6;width:1000px;text-align:left;weight:normal;" scope="col" | | 
| − | ==What is Teleworking?== | + | ==What is Remote Working?== | 
| − | As cloud technology, collaborative applications and internet connectivity increase, teleworking is becoming more prevalent than ever before.Teleworking is often done through the following ways: | + | As cloud technology, collaborative applications and internet connectivity increase, remote working is becoming more prevalent than ever before. Remote work is often done through the following ways: | 
|  |  |  |  | 
|  | *Tunneling - using a secure communications tunnel between a device and a remote access server, usually through a VPN. |  | *Tunneling - using a secure communications tunnel between a device and a remote access server, usually through a VPN. | 
| Line 21: | Line 21: | 
|  | *Remote Desktop(via RDP or VNC) - remotely control a particular host machine through the internet. |  | *Remote Desktop(via RDP or VNC) - remotely control a particular host machine through the internet. | 
|  |  |  |  | 
| − | ==Threats and Challenges posed by Teleworking== | + | ==Threats and Challenges posed by Remote Working== | 
|  | By connecting via the internet to potentially classified or sensitive applications or data, there are threats to the safety and security of that information. |  | By connecting via the internet to potentially classified or sensitive applications or data, there are threats to the safety and security of that information. | 
|  |  |  |  | 
| Line 69: | Line 69: | 
|  | *[[:en:images/0/09/FR_-_Guide_de_démarrage_pour_participer_un_appel_Zoom.pdf|Guide de démarrage pour participer un appel Zoom - FR]] |  | *[[:en:images/0/09/FR_-_Guide_de_démarrage_pour_participer_un_appel_Zoom.pdf|Guide de démarrage pour participer un appel Zoom - FR]] | 
|  | *[https://cyber.gc.ca/sites/default/files/publications/itsp.40.111-eng_1.pdf Cryptographic Algorithms for Unclassified, Protected A and Protected B Information - ITSP.40.111] |  | *[https://cyber.gc.ca/sites/default/files/publications/itsp.40.111-eng_1.pdf Cryptographic Algorithms for Unclassified, Protected A and Protected B Information - ITSP.40.111] | 
|  | + | |- | 
|  | + | | | 
|  | |} |  | |} |