(1)Research the different types of VPNs and other relevant remote access applications
(2)Discuss what they are and some common techniques used to try and subvert their security.
Your answer should include the terms, concepts, and theories learned thus far. Cite each source used. No credit will be given if Wikipedia is used. Your answer should be a minimum of 250 words.