EBK USING MIS
EBK USING MIS
10th Edition
ISBN: 8220103633642
Author: KROENKE
Publisher: YUZU
bartleby

Concept explainers

Expert Solution & Answer
Book Icon
Chapter 6.8, Problem 6.7ARQ

Explanation of Solution

VPN and its purpose:

A private internet access provides Virtual Private Network (VPN) service.

  • It is an extension of private network which includes links over shared or public network.
  • It helps an organization by providing secure methodology for encoding private network traffic.

Working principle of VPN:

The representation of working procedure of VPN is shown below:

  • The above figure will illustrate how VPN connects to a remote computer. Here VPN client is the remote user.
  • By accessing local Internet Service Provider, the client can makes a public connection to the Internet.
  • In other case, the client’s software on user’s computer will makes a connection with the VPN server.
  • Therefore, both VPN client and VPN server can have a safe connection and it is referred as “tunnel”.
  • A tunnel is a virtual, pathway over shared or public network from the VPN client and VPN server.

Virtual and it relates to VPN:

  • The term “virtual” means a thing which appears to exist but really does not.
  • VPN makes the presence of private connection on protected network using public internet.

Private cloud:

  • A private cloud is a specific model of cloud computing which includes a separate and secure cloud based infrastructure in which only the specified customer can activate.
  • A cloud which is owned and activated by an organization for their own profit is referred as “private cloud”.

Benefits of private cloud are questionable:

  • A private cloud provides the benefit of elasticity resource but to questionable profit. Because what else a company can do with their idle servers.
  • Unlike cloud dealers, an organization cannot repurpose the idle servers for the usage of other organizations.
  • Hence they realize to save some cost by shut down those servers...

Blurred answer
Students have asked these similar questions
why investing in skills and technology is a critical factor in the financial management aspect of systems projects.
Why are requirements changing a significant source of risks in system projects?
Why is functionality a key criterion in technology selection?
Knowledge Booster
Background pattern image
Computer Science
Learn more about
Need a deep-dive on the concept behind this application? Look no further. Learn more about this topic, computer-science and related others by exploring similar questions and additional content below.
Similar questions
SEE MORE QUESTIONS
Recommended textbooks for you
Text book image
MIS
Computer Science
ISBN:9781337681919
Author:BIDGOLI
Publisher:Cengage
Text book image
Principles of Information Security (MindTap Cours...
Computer Science
ISBN:9781337102063
Author:Michael E. Whitman, Herbert J. Mattord
Publisher:Cengage Learning
Text book image
Management Of Information Security
Computer Science
ISBN:9781337405713
Author:WHITMAN, Michael.
Publisher:Cengage Learning,
Text book image
CMPTR
Computer Science
ISBN:9781337681872
Author:PINARD
Publisher:Cengage
Text book image
Principles of Information Systems (MindTap Course...
Computer Science
ISBN:9781285867168
Author:Ralph Stair, George Reynolds
Publisher:Cengage Learning
Text book image
Principles of Information Systems (MindTap Course...
Computer Science
ISBN:9781305971776
Author:Ralph Stair, George Reynolds
Publisher:Cengage Learning