Reference no: EM131376721
ESSAY QUESTIONS Instructions: Answer all questions in a single document. Then submit to the appropriate assignment folder. Each response to a single essay question should be about a half-page in length (about 150 words).
1. Cryptographic algorithms provide the underlying tools to most security protocols used in today's infrastructures. The choice of which type of algorithm depends on the goal that you are trying to accomplish, such as encryption or data integrity. These algorithms fall into two main categories: symmetric key and asymmetric key cryptography. In this essay, please discuss the strengths and weaknesses of symmetric key cryptography and give an example of where this type of cryptography is used. Then discuss the strengths and weaknesses of asymmetric key cryptography and give an example of where this type of cryptography is used.
2. Cryptography has been used in one form or another for over 4000 years and attacks on cryptography have been occurring since its inception. The type of people attempting to break the code could be malicious in their intent or could just be trying to identify weaknesses in the security so that improvements can be made. In your essay response, define cryptanalysis and describe some of the common cryptanalytic techniques used in attacks.
3. Many people overlook the importance of physical security when addressing security concerns of the organization. Complex cryptography methods, stringent access control lists, and vigilant intrusion detection/prevention software will be rendered useless if an attacker gains physical access to your data center. Site and facility security planning is equally important to the technical controls that you implement when minimizing the access a criminal will have to your assets. In your essay response, define CPTED and describe how following the CPTED discipline can provide a more aesthetic alternative to classic target hardening approaches. Make sure that the three CPTED strategies are covered in your response.
4.What benefit do digital signatures provide and what are their characteristics? In your own words, what does non-repudiation mean?
5. Identify the malicious threat sources to physical security and their corresponding countermeasures.
What would be the benefits to customers
: What would be the benefits to customers if they could host iTunes in the clouds and access it using a variety of devices? What would be your fears if you were to use iTunes in the cloud?
|
Reviewed for the purposes of benchmarking
: Explain why you chose the websites you reviewed for the purposes of benchmarking. How do your chosen websites attract users? In other words, how are they marketing themselves?
|
What are the benefits or strengths of christian belief
: Analysis: Analyze the Christian worldview by addressing each of the following questions: What are the benefits or strengths of Christian belief? What is troublesome or confusing about Christianity? How does Christianity influence a person's thinking ..
|
Explain why measuring web traffic is not a good indicator
: Explain why measuring web traffic is not a good indicator of web sales or website success. How would you implement Business 2.0 characteristics to create a sense of community for your customers?
|
Appropriate assignment folder
: Cryptographic algorithms provide the underlying tools to most security protocols used in today's infrastructures. The choice of which type of algorithm depends on the goal that you are trying to accomplish, such as encryption or data integrity. Th..
|
Indicate how many copies of the work order would be required
: Prepare a document flowchart to show how the Repair/Maintenance Service Request. Indicate how many copies of the work order would be required and explain how each copy would be distributed.
|
Create a report detailing the business value gained
: Create a report detailing the business value gained by consolidating to a single website, along with your recommendation for consolidation.
|
Particular software engineering process
: You have to develop a very simple software (i.e., program/product/component/system) in just 7 days. To develop a good-quality software, you would like to follow a particular software engineering process or more than one process. The goal is to rel..
|
Where are there breaches of ethical behavior
: Address the following questions: What are the ethical issues? Where are there breaches of ethical behavior? How could each ethical theory you cite help people think about what constitutes virtuous or ethical behavior
|