Corporate IT Security Audit Compliance

Review the attached article. 

 In your own words, describe how VPN technology works: protocols used, underlying technologies, how Confidentiality, Integrity, and Availability are implemented. 

Tags: No tags