IT331-6: Formulate a network security design.
GEL-1.02: Demonstrate college-level communications through the composition of original materials in Standard English.
The purpose of this assignment is to test your knowledge and understanding of the concepts of the unit.
Scenario: You have been tasked with creating a training document on security for the Bio Corporation.
- Discuss the differences between external and internal threats as they relate to network security. Identify the threat which is most difficult to defend against and note the reasons why. List the protections which would be used specifically related to internal threats. Remember to cover why it is important for organizations to have a written security policy.
- Discuss “Pretty Good Privacy.” What is it? Why has it stood the test of time, and will it be good enough in the future? Why or why not? Compare it to Kerberos encryption.
- Identify and compare the two primary and currently used techniques to secure wireless communications. How safe are your data communications when using a typical wireless hotspot (public)? What can you do to improve your data security when using one of these services?
Complete the following questions in an MS Word Document in APA format. Double space your work and use current APA formatting (Sans Serif Fonts. Example Arial 11-point font). You must include both a separate cover and reference page.
Instructions for formatting the assignment, including length, style conventions, etc.
For more information on APA style formatting, go to Academic Writer, formerly APA Style Central, under the Academic Tools area of this course.
Also review the university policy on plagiarism. If you have any questions, please contact your professor.