Based on the uploaded lectures, I am listing 4 topics for discussion. You are required to answer 2 of them and peer reply to one of your classmates. The topics are:
- Discuss all the possible types of keys used during the encryption process.
- Find more efficient Wireless security protocol than WEP.
- Why companies uses VPN network.
- What type of organizations that needs confidentiality more than integrity from the CIA tried?