If you were setting up an encryption-based network, what key size would you choose and why? Explain your answer with examples.
How can we apply that security protocol in real life situations?
Provide at least two references to support your initial post.
Related
https://topclasswriter.com/wp-content/uploads/2021/07/log-300x60.png00Sophiahttps://topclasswriter.com/wp-content/uploads/2021/07/log-300x60.pngSophia2021-12-04 10:42:102021-12-04 10:42:10setting up an encryption based network and security protocol in real life situations