General Secure Data Transmission:Describe encapsulation, encryption, and authentication in virtual private networks (VPNs) and how they support CIA.

General Secure Data Transmission

Complete the following:

  • Describe encapsulation, encryption, and authentication in virtual private networks (VPNs) and how they support CIA.
  • Explain how network hardening contributes to an overall security profile.
  • Explain how network media controls contribute to the overall security profile of a network.
  • Describe the steps involved in implementing network address translation (NAT).
  • Explain the concept of attack timing (time to attack) and how it impacts integration of devices and networks with the public Internet.
  • Explain strategies for implementing wireless in organizations that require the use of both public and private wireless.

Part B: Case Study Related Questions

Use the organization and characteristics described in the Case Study: Global Widgets Inc. document found in the Required Resources as the context in which to address the following:

  • Describe critical technology components and procedures that are required to create an efficient and secure plan for merging the company’s public and private wireless networks.
  • Explain the advantages and disadvantages of implementing a proxy server as part of a webmail implementation project.
find the cost of your paper