CryptographyDescribe how federated identity management will impact the processes behind identifying end users.APA format, 300 wordsSummarize some of the important aspects of symmetric encryption.APA format, 300 wordsDetermine the impact that cryptography plays on email exchange. Should a company encrypt their email traffic and what would be the disadvantage for encrypting the data.APA format, 300 wordsTelecommuincation and Network SecurityDescribe a VPN and what it is used for. Describe VPN authentication/authorization.APA format, 300 wordsDevelop a VPN policy and deploymentplan. Describe common VPN threats/exploitsAPA format, 300 wordsDescribe differencesbetween software/hardware VPNs.APA format, 300 words