setting up an encryption based network and security protocol in real life situations
- If you were setting up an encryption-based network, what key size would you choose and why? Explain your answer with examples.
- How can we apply that security protocol in real life situations?
- Provide at least two references to support your initial post.