Search for question
Question

Assessment Part 1:

Complete the following questions in an MS Word Document in APA format. Double space

your work and use current APA formatting (Sans Serif Fonts. Example Arial 11-point font).

You must include both a separate cover and reference page.

Scenario: You have been tasked with creating a training document on security for the Bio

Corporation.

1. Discuss the differences between external and internal threats as they relate to

network security. Identify the threat which is most difficult to defend against and note

the reasons why. List the protections which would be used specifically related to

internal threats. Remember to cover why it is important for organizations to have a

written security policy.

2. Discuss "Pretty Good Privacy." What is it? Why has it stood the test of time, and will

it be good enough in the future? Why or why not? Compare it to Kerberos

encryption.

3. Identify and compare the two primary and currently used techniques to secure

wireless communications. How safe are your data communications when using a

typical wireless hotspot (public)? What can you do to improve your data security

when using one of these services?

Fig: 1