Ask Question, Ask an Expert

+61-413 786 465

info@mywordsolution.com

Ask Computer Network & Security Expert

Cryptography- Encryption in Business Use

Instructions:

Complete the attached Cryptography/Encryption Matrix by discussing how cryptography and encryption are used within a business to protect critical data for a security advisory that your learning team will present to the management group of XYZ Company for which your team is serving as consultants.

Focus your discussion on the historic aspect of cryptography as a background up to today's use of encryption to protect company data. Make sure and address not only the protection of static data but the use of dynamic areas of business use, such as e-mail. Refer to the following sections of the TestOut for LabSimSecurity Pro module, "Cryptography":

• Section 3.1: Cryptography
• Section 3.2: Hashing
• Section 3.3: Symmetric Encryption
• Section 3.4: Asymmetric Encryption
• Section 3.5: Public Key Infrastructure (PKI)
• Section 3.6: Cryptography Implementations

Note: The Cryptography/Encryption Matrix template is located on the next page.

Cryptography/Encryption Matrix

Questions

I. Encryption is used to protect connections between locations within a company - discuss the use of Virtual Private Networking (VPN) and how encryption is used to insure security.

II. In some recent cases of breach of security passwords and login credentials, along with identity information was stolen because the data was not protected. Discuss the proper way to protect critical data relating to customer and employees.

III. Use of public and private keys, to secure information that is passed across networks, is important to the security of company's data. Explain the use these encryption features.

IV. Explain the difference between symmetrical and asymmetrical encryption and provide examples of their use.

V. Discuss Hashing in the context of securing passwords in a company database for login credentials to standalone applications.

VI. Discuss "cryptography" and "encryption" in terms of acceptance in company operations - address employee's reluctance to accept and use this security feature.

Computer Network & Security, Computer Science

  • Category:- Computer Network & Security
  • Reference No.:- M92269956

Have any Question?


Related Questions in Computer Network & Security

What comparison of means test was used to answer the

What comparison of means test was used to answer the question I need it now is there a relationship between parents highest level of education and socioeconomic status\need the entire script

Overview of network security assessment - security

Overview of Network Security Assessment - Security Challenges in Emerging Networks Purpose of the assessment - The purpose of this assignment is to develop skills to independently think of innovation. Students will be ab ...

Data model development and implementationpurpose of the

Data model development and implementation Purpose of the assessment The purpose of this assignment is to develop data models and map Database System into a standard development environment to gain understanding of data m ...

Assignment -need project made by packet truce follow the

Assignment - Need project made by packet Truce. Follow the given report and please don't make the project big and video will describe full project in details and with configuration. Project - Design and Implementation of ...

Question do some research and find a case of cyber

Question : Do some research and find a case of cyber harassment or cyberbullying. Explain the case, and discuss the relevant theories of criminal justice associated with the perpetrator(s). Your response should be a mini ...

Cybersecurity policy design issues describe cybersecurity

Cybersecurity Policy Design Issues Describe cybersecurity policy features that are needed to protect against the Insider Threat, Operations Security, Access Control and Biometric Authentication What features can be added ...

This is from a practical exercise the answers are below but

This is from a practical exercise. The answers are below BUT, I do not know how they came up with them. I'd like a step-by-step explanation of how they got the answers. Practical Exercise 1: Assume the demand for teacher ...

Part ian attacker seeks to view the contents of a specific

Part I An attacker seeks to view the contents of a specific Microsoft Word document file to which they do not have any kind of access. You may assume that: - no exploitable vulnerabilities of any kind exist; - the attack ...

Research assignmentproduce a formal 2000 word report in the

Research Assignment Produce a formal 2000 word report, in the format described in the supplied "Reports format and style" document, examining the various "Transition from IPv4 to IPv6". You are to research and compare th ...

Question in a short paragraph explain the transmission of

Question : In a short paragraph, explain the transmission of data for a TCP connection between a client computer and a web server to request a web page. Assume that the server responds with a web page that fits in one pa ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

Why might a bank avoid the use of interest rate swaps even

Why might a bank avoid the use of interest rate swaps, even when the institution is exposed to significant interest rate

Describe the difference between zero coupon bonds and

Describe the difference between zero coupon bonds and coupon bonds. Under what conditions will a coupon bond sell at a p

Compute the present value of an annuity of 880 per year

Compute the present value of an annuity of $ 880 per year for 16 years, given a discount rate of 6 percent per annum. As

Compute the present value of an 1150 payment made in ten

Compute the present value of an $1,150 payment made in ten years when the discount rate is 12 percent. (Do not round int

Compute the present value of an annuity of 699 per year

Compute the present value of an annuity of $ 699 per year for 19 years, given a discount rate of 6 percent per annum. As