setting up an encryption based network and security protocol in real life situations

  • If you were setting up an encryption-based network, what key size would you choose and why? Explain your answer with examples.
  • How can we apply that security protocol in real life situations?
  • Provide at least two references to support your initial post.
0 replies

Leave a Reply

Want to join the discussion?
Feel free to contribute!

Leave a Reply

Your email address will not be published. Required fields are marked *