Waiting for answer This question has not been answered yet. You can hire a professional tutor to get the answer.
Discussion Questions 2
Please answer the following questions with at least 2 paragraphs each please.
Determine the importance of understanding the Transmission Control Protocol / Internet Protocol (TCP / IP) and Open Systems Interconnection (OSI) Reference models from the perspective of an ethical hacker. Determine the potential repercussions of a professional not understanding these models and the affect it could have on their duties.
Compare and contrast physical, internetwork, host-to-host, and application layer threats. Determine which you believe to be of the most concern to the security of networks and computer hosts. Analyze the controls designed to combat these threats and explain which layer’s controls you believe to be the most adequate for that layer’s threats. Justify your answer.
"Encryption Technologies" Please respond to the following:
Compare and contrast symmetric and asymmetric encryption and determine which you believe is the optimal choice for an enterprise. Additionally, identify each encryption’s potential uses on an enterprise level. Justify your answer.
From the e-Activity (listed below), discuss the tool’s primary uses, strengths and weaknesses, competing products, costs, system requirements, and whether hackers and / or security personnel commonly use the tool. Explain why you would or would not consider utilizing this tool as a security professional. If you would consider utilizing this tool, provide a scenario where this tool would assist you in your duties. If you would not consider utilizing this tool, justify your reasons why.
E-Activity ((Use the Internet to research at least one commonly used file and / or system encryption tool. Pay close attention to the tool’s primary uses, strengths and weaknesses, competing products, costs, system requirements, and whether hackers and / or security personnel commonly use the tool.))