Question: 1. Why is authentication so important in establishing (and maintaining, in some cases) a VPN connection? What might result if authentication were downplayed or omitted

1. Why is authentication so important in establishing (and maintaining, in some cases) a VPN connection? What might result if authentication were downplayed or omitted altogether?

2. Why are so many protocols and steps required to establish and maintain a secure VPN connection?

3. Do you believe that all data should be encrypted? Many computing professionals think this is a good idea. But some computing experts feel that no data should be encryptedthat all data and software should be openly available to anyone who wants it. Does encryption make data more valuable or desirable, especially to hackers and identity thieves? Would data be less desirable if anyone could access any data at any time?

4.What is the ideal password policy? As a group, discuss the parameters that organizations can use in setting password standards. These include password length, types of characters, frequency of password resetting, and other requirements. As a result of the discussion, create a document that describes the policy and the manner in which it will be enforced

Step by Step Solution

There are 3 Steps involved in it

1 Expert Approved Answer
Step: 1 Unlock blur-text-image
Question Has Been Solved by an Expert!

Get step-by-step solutions from verified subject matter experts

Step: 2 Unlock
Step: 3 Unlock

Students Have Also Explored These Related Databases Questions!