Discussion Post A: Telecommuincation and Network Security
a) How is the implementation of network security similar and different between on-perm and cloud environments? Give some examples.
b) How is the management of network security similar and different between on-perm and cloud environments? Give some examples.
Discussion Post B: Cryptography
a) Analyze asymmetric and symmetric encryption. Evaluate the differences between the two of them and which one that you would determine is the most secure.
The response must include a reference list. One-inch margins, double-space, Using Times New Roman 12 pnt font and APA style of writing and citations.