Godwin Pharmaceuticals has a private web server for its corporate network that runs on a Linux operating system. You have been contacted to make its network remotely accessible to the IT department.



Which of the following protocols would you apply so that the employees can have secured remote access to the computer server?

1. SSH (Secure Shell) - This protocol provides secure remote access to the server by encrypting the connection and authenticating users. It is commonly used for accessing remote servers in a secure manner.

2. VPN (Virtual Private Network) - Setting up a VPN allows users to securely connect to the corporate network from remote locations. It encrypts the data transmitted between the user's device and the server, ensuring security and privacy.

3. HTTPS - If the server hosts a web application or website, implementing HTTPS is essential for secure communication between the users' browsers and the server. HTTPS encrypts the data exchanged, protecting it from interception.

By using these protocols, the employees of Godwin Pharmaceuticals can securely access the company's server remotely without compromising the security of the network.