Example #1: Giving users access to a confidential network with sensitive data over the internet. Click the image for the full size RRO.