Post Requirements: Your posts must use at least two (2) sources of information (properly cited using the American Psychological Association (APA) citation guidelines) in addition to the “hypermedia” already provided to you as part of the course. Your post must consist of a minimum of 250 words and a maximum of 500 words. Technical accuracy, proper in-text citations, and depth of coverage all play a critical role in your overall score.
What role do Cryptographic Systems play in helping to secure information on a Network? Give some examples of how Cryptography is used on a modern network.
Discuss some of the most commonly used encryption algorithms or hashing functions. Discuss concepts like MD5, SHA1, Asymmetric Key Algorithms and Symmetric Key Algorithms.
What are some of the features of a Cisco ASA (Adaptive Security Appliance) Firewall?
Describe the role that NAT plays in a Network. Does IPv6 require NAT? Does NAT have an added security benefit. How does NAT complicate network communication?
What are some of the goals of Network Security Testing? Describe some of the different types of tests that take place on an organization’s network.
Write a small sample Security Policy and then explain why your policy would be critical to your organization’s security.
The post answer-all-discussions-1 first appeared on Term Paper Tutors.