Question1:  Discuss the methods of identifying  weak web server configurations and how to mitigate them for a secure web  server. Possible concepts to include are SSL certificates, HTTPS usage,  attack surface, SQL injection, vulnerability migration, and least  privilege. In at least one of your peer responses, provide an overview  of how to audit the web server’s security and implement best practices.

Question2: analyze the structure of advanced encryption standards and why it makes it so strong. 

Leave a Comment