Today’s computing environment
Why are remote access capabilities a necessity in today’s computing environment and how can an organization leverage these capabilities for greater productivity without creating a security risk?
Question B
Why is it important to apply security methods to both physical and wireless communications and which medium is easier to secure against an attack?