"Cryptography in Practice" Please respond to the following:
It is not uncommon for two or more organizations to collaborate to develop or enhance a product offering. Considering the shared data is extremely sensitive and must be top secret at all costs, formulate a possible solution with consideration to symmetric or asymmetric cryptography and describe the advantages and disadvantages of any solution employed.
The introduction of wireless networks has offered the availability of high throughput communications without the expense of a cabled network. However, this convenience comes at the cost of potentially reduced security. Formulate a possible encryption solution with consideration to WEP, WPA, WPA2, and 802.11i, and describe the advantages and disadvantages of any solution employed.