Technology Infrastructure

Technology Infrastructure
1. At a company, you are responsible for securing a network server utilized primarily for data storage and internal
application sharing as well as for securing numerous desktop computers connected to the network. Describe the
access control that you would put in place for each and explain why.
2. Generate a message of at least 30 characters. Using a Vigenere cipher key that is at least three letters long,
encrypt the message. You should list the initial message, the cipher key chosen, and the encrypted message.
Explain how secure you think this message is and justify your reasoning.