1.Describe authentication and authorization. Which depends on the other? How and why are these processes more complex in a modern networked organization than within an organization that supports all information processing with a single mainframe?
2.Describe Packet filtering and Application (as known as proxy servers) firewall types and how each can improve system security.