Question

In class, we discussed a scenario involving 802.11, VPN, and ssh identifying three distinct 6. points of encryption. For each

0 0
Add a comment Improve this question Transcribed image text
Answer #1

If we remove the 802.11's encryption part then your wireless network will not be secure. Intruders can easily able to connect yo your wireless network and can plant malware easily into your network. Generally the IEEE 802.11 protocol is used by WPA and removing the encryption and password protection will make your network vulnerable.

VPN or the Virtual Private Network is used to connect one private network to another with the help public Network. VPN generally uses SHA encryption that will create a secure tunnel to connect to the corporate network. So, if we remove the encryption part from the VPN then attacker can easily connect to the corporate network and can collect and exploit the data from the corporate network.

SSH protocol uses the SHA encryption algorithm to encrypt the public key and store it in .sshd_pub file. So removing the encryption from SSH protocol will allow any user to remotely connect to the machine and make changes to the machine.

So, encryption plays a vital role in providing security to the infrastructure.So, we can also add more security by enabling multi-factor authentication where a code will generate in your mobile and it should be needed to connect to the network. This code will keep on changing after 10 seconds and a new code will generate.

Add a comment
Know the answer?
Add Answer to:
In class, we discussed a scenario involving 802.11, VPN, and ssh identifying three distinct 6. points of encryption. Fo...
Your Answer:

Post as a guest

Your Name:

What's your source?

Earn Coins

Coins can be redeemed for fabulous gifts.

Not the answer you're looking for? Ask your own homework help question. Our experts will answer your question WITHIN MINUTES for Free.
Similar Homework Help Questions
  • I need help with my very last assignment of this term PLEASE!!, and here are the instructions: After reading Chapter T...

    I need help with my very last assignment of this term PLEASE!!, and here are the instructions: After reading Chapter Two, “Keys to Successful IT Governance,” from Roger Kroft and Guy Scalzi’s book entitled, IT Governance in Hospitals and Health Systems, please refer to the following assignment instructions below. This chapter consists of interviews with executives identifying mistakes that are made when governing healthcare information technology (IT). The chapter is broken down into subheadings listing areas of importance to understand...

  • First, read the article on "The Delphi Method for Graduate Research." ------ Article is posted below...

    First, read the article on "The Delphi Method for Graduate Research." ------ Article is posted below Include each of the following in your answer (if applicable – explain in a paragraph) Research problem: what do you want to solve using Delphi? Sample: who will participate and why? (answer in 5 -10 sentences) Round one questionnaire: include 5 hypothetical questions you would like to ask Discuss: what are possible outcomes of the findings from your study? Hint: this is the conclusion....

ADVERTISEMENT
Free Homework Help App
Download From Google Play
Scan Your Homework
to Get Instant Free Answers
Need Online Homework Help?
Ask a Question
Get Answers For Free
Most questions answered within 3 hours.
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT