Discussion Post: Computer and Network Security
o What do you think is the best combination of the types of authentication? Is that type of authentication appropriate for all types of access?
o Some have made the argument that using WEP presents more security issues than if all traffic were in the clear. What do you think?
The response must include a reference list. One-inch margins, double-space, Using Times New Roman 12 pnt font and APA style of writing and citations.