Identify and fully explain two types of intruder detection techniques
With the aid of a fully labeled diagram, explain the use of Public-Key Encryption between two communication devices/users.
Remote access protocols manage the connection between a remote computer and a remote access server. List and explain any four protocols used to connect a remote computer and a remote access server.