SlideShare a Scribd company logo
1 of 2
Part 1
Access to the back-end database will be an important part of the
network design. Research and discuss the different possibilities
for virtual private network (VPN) access to the back-end
database. Include in your discussion the different types of
VPNs, their key characteristic, and how they would be set up
and used for database access.
Outline your ideas in a 3–5-paragraph posting. Study the
postings of at least 2 other classmates, and respond to them with
comments and questions. Ask for clarifications of their ideas if
necessary.
Be sure to document your references using APA format.
Part 2
The command office has asked for a presentation on security
mechanisms including access control models, authentication,
authorization and encryption. Describe differences between
them and identify situations where appropriate. Discuss how
encryption relates to storage, network traffic, secure Web
access, and the e-mailing of documents. One topic of concern is
symmetrical versus public key.
The presentation should include the following information:
Comparison of security mechanisms
An explanation of public key cryptography
Historical background of the development of encryption
Typical uses of public key cryptography
Symmetrical versus public key
Encryption and how it relates to storage, network traffic, secure
Web access and e-mail
Prepare an 8–15-slide presentation to address these points.
Include speaker notes in the presentation. Plan the presentation
and speaker notes so that someone else could actually give the
presentation.
Be sure to document your references using APA format.

More Related Content

More from twilacrt6k5

Which of the following must be capitalized by a business[removed].docx
Which of the following must be capitalized by a business[removed].docxWhich of the following must be capitalized by a business[removed].docx
Which of the following must be capitalized by a business[removed].docx
twilacrt6k5
 
Which of the following is the BEST test for the theory of natural .docx
Which of the following is the BEST test for the theory of natural .docxWhich of the following is the BEST test for the theory of natural .docx
Which of the following is the BEST test for the theory of natural .docx
twilacrt6k5
 
Which of the following is the STRONGEST example of a salient stimu.docx
Which of the following is the STRONGEST example of a salient stimu.docxWhich of the following is the STRONGEST example of a salient stimu.docx
Which of the following is the STRONGEST example of a salient stimu.docx
twilacrt6k5
 
Which Dynasty saw the reunification of Egypt and thus brought about .docx
Which Dynasty saw the reunification of Egypt and thus brought about .docxWhich Dynasty saw the reunification of Egypt and thus brought about .docx
Which Dynasty saw the reunification of Egypt and thus brought about .docx
twilacrt6k5
 
Whether a health care policy was formulated at the federal (country).docx
Whether a health care policy was formulated at the federal (country).docxWhether a health care policy was formulated at the federal (country).docx
Whether a health care policy was formulated at the federal (country).docx
twilacrt6k5
 
When you were attending AIU, you thought of yourself being an underc.docx
When you were attending AIU, you thought of yourself being an underc.docxWhen you were attending AIU, you thought of yourself being an underc.docx
When you were attending AIU, you thought of yourself being an underc.docx
twilacrt6k5
 
When new parents are expecting a baby, they rarely consider the poss.docx
When new parents are expecting a baby, they rarely consider the poss.docxWhen new parents are expecting a baby, they rarely consider the poss.docx
When new parents are expecting a baby, they rarely consider the poss.docx
twilacrt6k5
 

More from twilacrt6k5 (20)

Which one of the theories discussed in Chapters 3 and 4 of our cours.docx
Which one of the theories discussed in Chapters 3 and 4 of our cours.docxWhich one of the theories discussed in Chapters 3 and 4 of our cours.docx
Which one of the theories discussed in Chapters 3 and 4 of our cours.docx
 
Which of the following must be capitalized by a business[removed].docx
Which of the following must be capitalized by a business[removed].docxWhich of the following must be capitalized by a business[removed].docx
Which of the following must be capitalized by a business[removed].docx
 
Which of the following leader roles involves offering direction to.docx
Which of the following leader roles involves offering direction to.docxWhich of the following leader roles involves offering direction to.docx
Which of the following leader roles involves offering direction to.docx
 
Which of the following is the BEST test for the theory of natural .docx
Which of the following is the BEST test for the theory of natural .docxWhich of the following is the BEST test for the theory of natural .docx
Which of the following is the BEST test for the theory of natural .docx
 
Which of the following is the STRONGEST example of a salient stimu.docx
Which of the following is the STRONGEST example of a salient stimu.docxWhich of the following is the STRONGEST example of a salient stimu.docx
Which of the following is the STRONGEST example of a salient stimu.docx
 
Which of the following is not listed as a challenge in long dist.docx
Which of the following is not listed as a challenge in long dist.docxWhich of the following is not listed as a challenge in long dist.docx
Which of the following is not listed as a challenge in long dist.docx
 
Which of the assumptions of realism make the most sense to you Do y.docx
Which of the assumptions of realism make the most sense to you Do y.docxWhich of the assumptions of realism make the most sense to you Do y.docx
Which of the assumptions of realism make the most sense to you Do y.docx
 
Which Dynasty saw the reunification of Egypt and thus brought about .docx
Which Dynasty saw the reunification of Egypt and thus brought about .docxWhich Dynasty saw the reunification of Egypt and thus brought about .docx
Which Dynasty saw the reunification of Egypt and thus brought about .docx
 
Which disease can affect the human nervous system resulting in par.docx
Which disease can affect the human nervous system resulting in par.docxWhich disease can affect the human nervous system resulting in par.docx
Which disease can affect the human nervous system resulting in par.docx
 
Which characteristics are typically used to classify racespheno.docx
Which characteristics are typically used to classify racespheno.docxWhich characteristics are typically used to classify racespheno.docx
Which characteristics are typically used to classify racespheno.docx
 
Whether we know it or not, we already have an attitude toward our li.docx
Whether we know it or not, we already have an attitude toward our li.docxWhether we know it or not, we already have an attitude toward our li.docx
Whether we know it or not, we already have an attitude toward our li.docx
 
Whether a health care policy was formulated at the federal (country).docx
Whether a health care policy was formulated at the federal (country).docxWhether a health care policy was formulated at the federal (country).docx
Whether a health care policy was formulated at the federal (country).docx
 
Where did the makers of the Treaty of Versailles which ended W.docx
Where did the makers of the Treaty of Versailles which ended W.docxWhere did the makers of the Treaty of Versailles which ended W.docx
Where did the makers of the Treaty of Versailles which ended W.docx
 
Where Does U.S. Law Come FromYour task in this applicatio.docx
Where Does U.S. Law Come FromYour task in this applicatio.docxWhere Does U.S. Law Come FromYour task in this applicatio.docx
Where Does U.S. Law Come FromYour task in this applicatio.docx
 
When you were attending AIU, you thought of yourself being an underc.docx
When you were attending AIU, you thought of yourself being an underc.docxWhen you were attending AIU, you thought of yourself being an underc.docx
When you were attending AIU, you thought of yourself being an underc.docx
 
When young Mende women become members of Sande they go through three.docx
When young Mende women become members of Sande they go through three.docxWhen young Mende women become members of Sande they go through three.docx
When young Mende women become members of Sande they go through three.docx
 
When you read the Gospel of John you will see that it is quite diffe.docx
When you read the Gospel of John you will see that it is quite diffe.docxWhen you read the Gospel of John you will see that it is quite diffe.docx
When you read the Gospel of John you will see that it is quite diffe.docx
 
When new parents are expecting a baby, they rarely consider the poss.docx
When new parents are expecting a baby, they rarely consider the poss.docxWhen new parents are expecting a baby, they rarely consider the poss.docx
When new parents are expecting a baby, they rarely consider the poss.docx
 
When evaluating art movements, make sure you are selecting one speci.docx
When evaluating art movements, make sure you are selecting one speci.docxWhen evaluating art movements, make sure you are selecting one speci.docx
When evaluating art movements, make sure you are selecting one speci.docx
 
When it comes to religious pluralism, John Hick is one of the most a.docx
When it comes to religious pluralism, John Hick is one of the most a.docxWhen it comes to religious pluralism, John Hick is one of the most a.docx
When it comes to religious pluralism, John Hick is one of the most a.docx
 

Part 1Access to the back-end database will be an important

  • 1. Part 1 Access to the back-end database will be an important part of the network design. Research and discuss the different possibilities for virtual private network (VPN) access to the back-end database. Include in your discussion the different types of VPNs, their key characteristic, and how they would be set up and used for database access. Outline your ideas in a 3–5-paragraph posting. Study the postings of at least 2 other classmates, and respond to them with comments and questions. Ask for clarifications of their ideas if necessary. Be sure to document your references using APA format. Part 2 The command office has asked for a presentation on security mechanisms including access control models, authentication, authorization and encryption. Describe differences between them and identify situations where appropriate. Discuss how encryption relates to storage, network traffic, secure Web access, and the e-mailing of documents. One topic of concern is symmetrical versus public key. The presentation should include the following information:
  • 2. Comparison of security mechanisms An explanation of public key cryptography Historical background of the development of encryption Typical uses of public key cryptography Symmetrical versus public key Encryption and how it relates to storage, network traffic, secure Web access and e-mail Prepare an 8–15-slide presentation to address these points. Include speaker notes in the presentation. Plan the presentation and speaker notes so that someone else could actually give the presentation. Be sure to document your references using APA format.