Evaluate the symmetrical key and public key encryption


Wireless and Remote Access Security

Key Assignment Draft

Great progress has been made on the design of the network with the addition of the client and server security models in the previous assignment. With the increasing popularity of remote workers and mobile devices, wireless and remote communications security is becoming an ever-increasing threat to organizations. This assignment will address wireless and remote access security for the network.

For this assignment, you will continue to work on the Network Security Architecture Design document with an evaluation of encryption methods and appropriate tools and methods to secure the wireless and remote access components and entry points in the network.

The project deliverables are as follows:

• Update the Network Security Architecture Design title page with a new date and project name.
• Update previously completed sections based on instructor feedback.
• Wireless and remote access security

o Encryption and virtual private network (VPN) access security

- Evaluate the symmetrical key and public key encryption methods, and select the most appropriate for use in the network for secure data transmission.
- Justify your selection based on an analysis of the pros and cons of each method and suitability to your network.
- Outline the methods to secure VPN access to the network and the back end databases.

o Wireless security

- Review and select the tools and methods that are necessary to securing the wireless components of the network.
- Justify your selections based on the wireless security needs of the network.

• Be sure to update your table of contents before submission.

Request for Solution File

Ask an Expert for Answer!!
Computer Network Security: Evaluate the symmetrical key and public key encryption
Reference No:- TGS01710412

Expected delivery within 24 Hours