top of page
References
VLE file – P3 Notes
http://www.dhk.com/services/managed-security/intrusion-detection-and-prevention/288-2/
https://www.whatismyip.com/what-is-a-vpn/
https://www.techopedia.com/definition/4806/virtual-private-network-vpn
http://www.pctools.com/security-news/what-does-a-firewall-do/
http://www.teach-ict.com/glossary/A/audit_log.htm
http://searchcompliance.techtarget.com/definition/audit-log-AL
http://searchdatabackup.techtarget.com/definition/cloud-backup
http://searchstorage.techtarget.com/definition/RAID
http://www.teach-ict.com/glossary/D/data_redundancy.htm
http://www.computerhope.com/jargon/h/handshak.htm
http://www.computerhope.com/jargon/c/callback.htm
bottom of page