(1) Discuss the differences between external and internal threats as they relate to network security. Which threat is most difficult to defend against and why? What protections would be used specifically related to internal threats? Why is it important for organizations to have a written security policy? Sources http://www.zdnet.com/article/the-top-five-internal-security-threats/ http://www.computerweekly.com/feature/Top-five-threats http://www.crn.com/slide-shows/security/240002785/7-security-threats-circling-your-network.htm https://www.sans.org/security-resources/policies/ (2) Highlight the basic functions and operation of public key cryptography. What is the Advanced Encryption Standard? How are digital signatures generated and used? Sources https://ssd.eff.org/en/module/introduction-public-key-cryptography-and-pgp Author: Abed Ayyad (2015) http://www.ams.org/notices/200004/fea-landau.pdf http://www.techrepublic.com/article/leveraging-the-power-of-digital-signatures/ (3) Discuss Pretty Good Privacy. What is it? Why has it stood the test of time, and will it be good enough in the future, why or why not? Compare it to Kerberos encryption. http://www.makeuseof.com/tag/pgp-me-pretty-good-privacy-explained/ http://denis.arnaud.free.fr/zds/report/node45.html Author: Denis Arnaud (1997) https://www.youtube.com/watch?v=PKxDvzUlBBA https://www.youtube.com/watch?v=kp5d8Yv3-0c (4) Identify and compare the two primary and currently used techniques to secure wireless communications. How safe are your data communications when using a typical wireless hotspot (public)? What can you do to improve your data security when using one of these services? Sources http://www.remotemagazine.com/main/articles/securing-wireless-communication-networks/ https://www.howtogeek.com/167783/htg-explains-the-difference-between-wep-wpa-and-wpa2-wireless-encryption-and-why-it-matters/ http://www.pcworld.com/article/130330/article.html http://www.theguardian.com/technology/askjack/2010/sep/16/internet-wifi-security-ask-jack WL46YPJbItk