Problem
1. How does a false positive alarm differ from a false negative alarm? From a security perspective, which is less desirable?
2. How does a network-based IDPS differ from a host-based IDPS?
3. What is an open port? Why is it important to limit the number of open ports to those that are absolutely essential?
4. What is a cryptographic key, and what is it used for? What is a more formal name for a cryptographic key?
5. What are the three basic operations in cryptography?
6. What are the components of PKI?
The response must include a reference list. Using Times New Roman 12 pnt font, double-space, one-inch margins, and APA style of writing and citations.