摘要 |
A computer-implemented method for configuring and securing a first device, the method including performing a first check of the first device to determine the presence of unauthorised components or modules in a memory of the first device, performing a second check of the device to compare hardware components of the first device against a predetermined list of authorised components, initiating an encrypted virtual private network (VPN) tunnel between the first device and a second device that is remote from the first device by transmitting a request from the first device to the second device including data representing multiple parameters associated with the first device. |