- 1. What do you believe should be the primary security guideline(s) when designing the authorization for access to a VPNs and for VPN users? How would you utilize them, and how would you enforce them?
- 2. In your own words, discuss why human resources are the weakest links in any access control system. Also, give three examples of what steps can be taken to mitigate the “human effect.”
(Be sure to cite your sources using an APA format. There should be a minimum of two sources per question.)