ISSC363 AMU VPN And Remote Access Applications Discussion

For this assignment, submit your initial post addressing the topics below. Continue to follow your classmates’ posts for the remainder of the week and post at least one to two follow-up messages to your classmates’ posts prior to midnight ET on Sunday. Your follow-up posts can add additional insight to a classmate’s opinions or can challenge their opinions. Use examples from the readings, or from your own research, to support your views, as appropriate. Be sure to read the follow-up posts to your own posts and reply to any questions or requests for clarification. By the way, include the name of the person’s post you are replying to. Thanks!


(1)Research the different types of VPNs and other relevant remote access applications

(2)Discuss what they are and some common techniques used to try and subvert their security.


Your answer should include the terms, concepts, and theories learned thus far. Cite each source used. No credit will be given if Wikipedia is used. Your answer should be a minimum of 250 words. To post, click on the Topic title (e.g., Week 7 Forum to access the topic and then click the “Post New Thread” button.

In addition — to get full credit — respond to at least 2 other student’s postings with points and counter points. Each response should be a minimum of 150 words. Duplicate postings will not receive credit.

——————Rubric for Learner Post

1. Synthesis of concepts in 250 words or more
2. Applications of personal experience
3. Clear citations
4. Writing standards
5. Response to 2 other Learners in 150 words or more

6. Timeliness

"Order a similar paper and get 100% plagiarism free, professional written paper now!"

Order Now