Assignment 7 NO REFLECTION.docx - Billy Lancaster CIS 1180 Reflection In this chapter we discuss usefulness of cloud computing encryption and various

Assignment 7 NO REFLECTION.docx - Billy Lancaster CIS 1180...

This preview shows page 1 out of 1 page.

Billy Lancaster CIS 1180 7/9/18 Reflection: In this chapter we discuss usefulness of cloud computing encryption and various internet protocols. Starting with cloud computing, it is the process of remote connecting to a server and allowing the server to do the intense work that your desktop computer may not be able to handle. You pay for this service in exchange for being able to complete complex tasks. Encryption is a form of securing your own data and also your hardware. By not showing your information or passwords in plain text and being forced to have to have the key to see your information keeping it safe from anyone who sees it. By encrypting your internet usage by using a vpn means that no one can use any of the information that you transmit online. We also discuss a very important tool for anyone who works with computers, remote connections. For those who are versed in command-line control of desktop computers you can use SSH and TELNET to run commands on computers over a network. For those who do not know how to do that you can use
Image of page 1

You've reached the end of your free preview.

Want to read the whole page?

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture