The sphere of security shows how access controls can be implemented to defend against threats. Firewalls have been a significant control mechanism to control the flow of information. Select and discuss a firewall type from this week’s reading. Include what factors you would include in a brief to your organizational leadership in selecting this firewall for your organization’s network.
Symmetric and Asymmetric Encryption
Discuss the difference between Symmetric and Asymmetric Encryption to include the process each uses to secure the information between the sender and receiver. Which is more secure?