Problem
(i) What is an Application Programming Interface (API), and why is it important to secure on the network?
(ii) What happens when improper key management is used on a network? What security measures would you use to correct improper or insecure key management?
(iii) What are logging and monitoring? Which tools would you implement to make sure logging and monitoring are used properly to protect a network?