Part 1: Review Questions
What is the difference between authentication and
authorization? Can a system permit authorization without
authentication? Why or why not?
What is the typical relationship between the untrusted network,
the firewall, and the trusted network?
How does a network-based IDS differ from a host-based IDS?
What is a VPN? Why are VPNs widely used?
Part 2: Module Practice
Create a spreadsheet that takes eight values into eight different
cells and then applies a transposition cipher to them. Next,
create a row that takes the results and applies a substitution
cipher to them (substitute 0 for 5, 1 for 6, 2 for 7, 3 for 8, 4 for
9, and vice versa).

Part 1 Review QuestionsWhat is the difference between authenticat.docx

  • 1.
    Part 1: ReviewQuestions What is the difference between authentication and authorization? Can a system permit authorization without authentication? Why or why not? What is the typical relationship between the untrusted network, the firewall, and the trusted network? How does a network-based IDS differ from a host-based IDS? What is a VPN? Why are VPNs widely used? Part 2: Module Practice Create a spreadsheet that takes eight values into eight different cells and then applies a transposition cipher to them. Next, create a row that takes the results and applies a substitution cipher to them (substitute 0 for 5, 1 for 6, 2 for 7, 3 for 8, 4 for 9, and vice versa).