What pros and cons of symmetric versus asymmetric algorithms


Assignment

Note: This is a research-writing course. You need to develop each requirement in full paragraphs, not sentences. I need to see proof of understanding of each requirement. Some questions have multiple parts. Answer each within the same numbered question.

1. Fully explain each of the following: What kinds of cyber-attacks have you experienced? Have you had a computer that was infected with a virus? Have you been unable to use a site by experiencing a DoS attack or downloaded spyware or a Trojan horse? Have you fallen for a phishing scheme? What do you do to secure your information on the Internet?

2. How many passwords do you use? Why?

3. What are the pros and cons of symmetric versus asymmetric encryption algorithms? What issues must be considered when deciding what kind of encryption to use?

4. Imagine a networked embedded system attached to your air conditioning system. This system permits the power company to raise the thermostat, or cycle the system on and off when energy demands are high. If every household had such a device, what might be the ramifications of a cyber-attack?

5. Do you believe that "hackers" who do things like expose the identity of rapists are White hats or Black hats? Regardless of the law, do you feel they are being ethical? Are they being moral? Is it right for them to be sentenced to a longer jail term than the individuals they uncovered?

6. Use the ethical tools from the chapter to discuss the ramifications of electronic medical records. Suppose that there was a nationwide database of electronic medical records, with strong security to try to prevent unauthorized access. What would be the benefits and costs of such a system? Apply the "paramedic method" to analyze this subject.

7. Compare the different ethical approaches discussed in the chapter. How are they similar and how different? How might you choose the best approach for a given situation?

8. What efforts, if any, do you make to preserve your privacy online? Do you share images, videos, and postings publically, or do you limit access? Why have you made the decisions that you have about personal information online? What might you change in the future?

9. Discuss the propagation of fake news. What are some methods of combating it?

Format your assignment according to the following formatting requirements:

1. The answer should be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides.

2. The response also includes a cover page containing the title of the assignment, the student's name, the course title, and the date. The cover page is not included in the required page length.

3. Also include a reference page. The Citations and references should follow APA format. The reference page is not included in the required page length.

Solution Preview :

Prepared by a verified Expert
Other Subject: What pros and cons of symmetric versus asymmetric algorithms
Reference No:- TGS02989985

Now Priced at $50 (50% Discount)

Recommended (93%)

Rated (4.5/5)

2015 ┬ęTutorsGlobe All rights reserved. TutorsGlobe Rated 4.8/5 based on 34139 reviews.