Creating a training document on security for the Bio Corporation.

 

 

 

 

 

 

 

Scenario: You have been tasked with creating a training document on security for the Bio Corporation.

Discuss the differences between external and internal threats as they relate to network security. Identify the threat which is most difficult to defend against and note the reasons why. List the protections which would be used specifically related to internal threats. Remember to cover why it is important for organizations to have a written security policy.
Discuss “Pretty Good Privacy.” What is it? Why has it stood the test of time, and will it be good enough in the future? Why or why not? Compare it to Kerberos encryption.
Identify and compare the two primary and currently used techniques to secure wireless communications. How safe are your data communications when using a typical wireless hotspot (public)? What can you do to improve your data security when using one of these services?

Leave a Comment

Your email address will not be published. Required fields are marked *

Our customer support team is here to answer your questions. Ask us anything!