Discuss three ways in which attackers use encryption

Assignment Help Computer Engineering
Reference no: EM133626575

Discussion Post

Your task: You have been asked to give a presentation to the Chief Technology Officer's (CTO's) staff for their monthly "brown bag" luncheons. The subject of this session is: Use and Misuse of Encryption.

Background: Cryptographic algorithms provide the underlying tools to most security protocols used to implement encryption in enterprises and critical infrastructures. The choice of which type of algorithm to implement depends on the goal that you are trying to accomplish, e.g. ensuring data privacy or ensuring integrity of software or data. Cryptographic algorithms fall into two main categories: symmetric key and asymmetric key cryptography.

In the first part of your briefing to CTO Staff, please identify and discuss the strengths and weaknesses of

1) symmetric key cryptography
2) asymmetric key cryptography

For each type of cryptographic algorithm, you should provide an example of where this type of cryptography would be used within the software and services that the enterprise depends upon and the type of resource to be protected (e.g. passwords stored in hashed format).

In the second part of your briefing, identify and discuss at least three ways in which attackers and/or criminals use encryption and cryptography to further their goals and objectives. These could include using encrypted chat to avoid wiretaps or surveillance or using encryption to deny legitimate users access to data or systems (e.g. ransomware). If countermeasures are available, describe and discuss them.

Reference no: EM133626575

Questions Cloud

Doctor for well-child check-up : On a took her nine-year-old to the doctor for a well-child check-up. The child's heart rate was 90 and her respiratory rate was 22.
Discuss the relative sensitivities for both analytes : Discuss the relative sensitivities for both analytes from the slope of their respective calibration curves and the detection limits determined the slop
Submit a draft of your research of dod-specific requirements : Submit a draft of your research of DOD-specific requirements for an organization's IT infrastructure and U.S. compliance laws that may affect the firm.
What component number will be given to each vertex : What component number will be given to each vertex? You should assume that all adjacency lists are in alphabetical order (i.e. the for loop in Explore iterates
Discuss three ways in which attackers use encryption : Identify and discuss at least three ways in which attackers and/or criminals use encryption and cryptography to further their goals and objectives.
Perform normalization to obtain normalised tables : Perform normalization to obtain normalised tables to 3rd normal forms (3NF). Using the data from below, show the steps from UNF to 1NF, 2NF and 3NF.
Process analysis of the behavior of three processes : Process Analysis of the behavior of three processes in an operating system. Each process has a different number of instructions, and some processes
Pregnancy causes increased blood pressure : The lisinopril dose may need to be increased if the pregnancy causes an increased blood pressure.
Importance of promoting health by highlighting which concept : When caring for client who has just been diagnosed with chronic illness, nurse understands the importance of promoting health by highlighting which concept?

Reviews

Write a Review

Computer Engineering Questions & Answers

  In a four- to five-page paper analyze a business task that

in a four- to five-page paper analyze a business task that you would like to computerize. consider how you could use

  Perform experimentally on a controlled rectifier

Perform experimentally on a controlled rectifier with resistive load - characteristics evaluate the performance and write an inference

  Write an implementation of this method for the class

Suppose that you want an operation for the ADT list that adds an array of items to the end of the list. The header of the method could be as follows.

  Write a client-server program

Write a client-server program. The server has the following properties: It wait for requests at port 12345. It will create a thread to serve one incoming request

  Program to show inflation rates for two successive years

Write a program in C++ that outputs inflation rates for two successive years and whether the inflation s increasing or decreasing.

  Write a multi-layer neural network in the language

Principles of Neural Systems and Implementation Project Guidelines - Each project requires the development of a program. This means that some programming skills are essential for completing the project successfully.

  Develop document that describes design for a small web site

Develop a 5-6 page Word document that describes the design for a small Web site that meets the following specifications.

  Describe any suspicions you have about system architecture

Discuss your thoughts on what you think the response time will be and why. Describe any suspicions you have about the system architecture.

  Write a program that accepts an input string

Write a program that accepts an input string from the user and determines how many times a user-specified character appears within the string.

  How could gm use game theory to identify major risks

Chapters 30, 31, and 34 presented three mini-case studies on ERM and risk. Each one presented a slightly different risk scenario. Suppose General Motors wants.

  Write a program that displays the sheep number that you are

Write a program that displays the sheep number that you are on (i.e. 1 sheep, 2 sheep). You have decided to count down from 100.

  Create a program that begins by prompting the user

Create a program that begins by prompting the user for an input file (which contains the message), 5 shift amounts (all integers).

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd