Compare and contrast strayer universitys identity


1. From the first e-Activity, what are some best practices that could be used by businesses to ensure that digital certificates are not fake certificates?

***E-Activity: Go to Computerworld's Website and read "Researchers hack VeriSign's SSL scheme for securing websites", located athttps://www.computerworld.com/s/article/9124558/Researchers_hack_VeriSign_s_SSL_scheme_for_securing_Web_sites. ***

2. What is the purpose of encrypting a disk? What are some of the advantages and disadvantages in doing so? Would you use BitLocker to protect your data?

3. From the second e-Activity, evaluate the decision Dartmouth made to implement the Oracle Identity Manager 11g in terms of administrative functions, cost, and ease of use. Determine whether or not Dartmouth's requirements were reasonable and easy to implement. Explain why or why not.

***E-Activity: Download and read the PDF file, "Oracle Identity Management at Dartmouth College: A Case Study", located at https://aptecllc.com/case-studies/oim11g/case-study-titile-goes-here-pdf. Be prepared to discuss. Note: If you experience difficulties viewing the PDF file, you may need to copy and paste the Web address into a browser for direct access to the file.***

4. Compare and contrast Strayer University's identity management system (which students are required to use to access their classes, grades, course schedules, registration, etc.) to the Oracle Identity Manager 11g. Determine which one you prefer and explain why.

Request for Solution File

Ask an Expert for Answer!!
Basic Computer Science: Compare and contrast strayer universitys identity
Reference No:- TGS01093949

Expected delivery within 24 Hours