This essay has been submitted by a student. This is not an example of the work written by professional essay writers.
Uncategorized

Arguments Lisa might use in favor of SSL.

This essay is written by:

Louis PHD Verified writer

Finished papers: 5822

4.75

Proficient in:

Psychology, English, Economics, Sociology, Management, and Nursing

You can get writing help to write an essay on these topics
100% plagiarism-free

Hire This Writer

Arguments Lisa might use in favor of SSL.

Secure Sockets Layer (SSL) facilitates secure communication through authentication encryption and decryption. SSL prevents phishing in websites, boosts search engine, maintains Payment card industry compliance (PCI), and builds trust with employees by ensuring confidentiality. The SSL certificates enable data protection by requiring authentication and compliance through higher network layers to protect employee information. Such builds trust that data is being protected to prevent hackers from taking advantage. Elnaggar (2015) argues that SSL boosts search engine rankings by taking into account page rankings such as HTTPS, which, if not utilized, would negatively affect a company search engine optimization (SEO). For example, some websites use pop-ups to warn users that the sites are not secure. Hence, such information would rank one website higher than the one that does not warn users. Moreover, through PCI, the organization can grow its e-commerce payment capabilities.

  1. . Arguments Tina might use in favor of IPsec.

Internet Protocol Security (IPsec) provides data authentication through protocols of two access points. It allows transparency in applications, a broader spectrum of standards, allows remote access, and provides greater security. Al-Qurabat (2015) states that unlike other security protocols, the IPsec broader spectrum of layers allows open protocols and authentication of algorithms. Transparency is ensured since it operates on layer 3; it has no impact on other layers (Qurabat 2015). Since it is used for inter-site connection, some of the computers may not have IPsec capabilities, but the computers end up running as usual due to remote access. Such would help employees work in different locations as work demands. Through the router, a secure tunnel is ensured, which protects sensitive information.

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

Reference

Al-Qurabat, A. (2015). What is IPsec. 10.13140/RG.2.2.27865.62569.

Elnaggar, A. (2015). Secure Socket Layer. 10.13140/RG.2

  Remember! This is just a sample.

Save time and get your custom paper from our expert writers

 Get started in just 3 minutes
 Sit back relax and leave the writing to us
 Sources and citations are provided
 100% Plagiarism free
error: Content is protected !!
×
Hi, my name is Jenn 👋

In case you can’t find a sample example, our professional writers are ready to help you with writing your own paper. All you need to do is fill out a short form and submit an order

Check Out the Form
Need Help?
Dont be shy to ask