Internet Security
1. Descibe ciphertext and explain how you would test a piece of ciphertext to determine quickly if it was likely the result of transposition? 2. Describe how a VPN works. 3. Describe how a DMZ is used to protect a network but remain open for business. 4. Describe the difference of how a HIDS and NIDS work. Please spell out th