Question: 1 ) Website Security with SSL ( HTTPS ) : Trust in the security of a website depends on several factors, such as the reputation
Website Security with SSL HTTPS:
Trust in the security of a website depends on several factors, such as the reputation of the site, the security measures implemented, and your own cautiousness.
On a scale from to with being secure it's hard to assign a single number. It varies depending on the specific website and its security practices.
we can't say the trust on the scale of because it vary from one website to aother.
Security concerns:
You should be concerned about factors beyond SSL such as the website's overall security posture, data storage practices, potential vulnerabilities, and the handling of your data.
SSL encrypts sensitive details such as login credentials, social security numbers, and bank information so that unauthorized users cannot interpret and use the data, even if they see it
Secure Remote Login with SSH:
Trust in the security of SSH can be relatively high, but it's essential to keep it updated and configure it properly for maximum security.
On a scale from to SSH may often be rated around for security, but this can vary depending on the specific use case and configurations.
Security Concerns:
Concerns may include weak passwords, improperly configured SSH settings, and potential vulnerabilities in the SSH software. Regularly updating and patching SSH is essential.
Network Security Protocols:
The choice of protocol depends on the requirements of the network and the services being provided.
Desired Security Protocols:
The desire for new security protocols often emerges in response to emerging threats.
For instance, as quantum computing advances, there may be a need for postquantum cryptography protocols to replace existing encryption methods that could be broken by quantum computers.
Additionally, as technology evolves, there may be new protocols to address emerging threats and vulnerabilities in areas like IoT security or G networks.
When choosing from among WEP, WPA, WPA and WPA wireless security protocols, experts agree WPA is best for WiFi security.
Step by Step Solution
There are 3 Steps involved in it
1 Expert Approved Answer
Step: 1 Unlock
Question Has Been Solved by an Expert!
Get step-by-step solutions from verified subject matter experts
Step: 2 Unlock
Step: 3 Unlock
