Question
1. Why is authentication so important in establishing (and maintaining, in some cases) a VPN connection? What might result if authentication were downplayed or omitted
1. Why is authentication so important in establishing (and maintaining, in some cases) a VPN connection? What might result if authentication were downplayed or omitted altogether?
2. Why are so many protocols and steps required to establish and maintain a secure VPN connection?
3. Do you believe that all data should be encrypted? Many computing professionals think this is a good idea. But some computing experts feel that no data should be encryptedthat all data and software should be openly available to anyone who wants it. Does encryption make data more valuable or desirable, especially to hackers and identity thieves? Would data be less desirable if anyone could access any data at any time?
4.What is the ideal password policy? As a group, discuss the parameters that organizations can use in setting password standards. These include password length, types of characters, frequency of password resetting, and other requirements. As a result of the discussion, create a document that describes the policy and the manner in which it will be enforced
Step by Step Solution
There are 3 Steps involved in it
Step: 1
Get Instant Access to Expert-Tailored Solutions
See step-by-step solutions with expert insights and AI powered tools for academic success
Step: 2
Step: 3
Ace Your Homework with AI
Get the answers you need in no time with our AI-driven, step-by-step assistance
Get Started