Critical views on the advantages and disadvantages of


Background Readings: To assure a trusted and resilient information and communications infrastructure, it is essential to secure the computer networks. Computer networks are implemented via technology. Part of solutions of their security in essence need to be via technology as well. The following two presentations provide the security protocols common in computer networks.

Kizza. Computer Network Security Protocols and Standards. Presentation.

Perlman, R. (2004), Network Security Protocls: A Tutorial. Presentation.

As you see from the presentations, to understand computer network security protocols, it is important to understand what cryptography is, as it is the building block of security protocols. The following reading provides a thorough review:

Kessler, G. (2011). An overview of cryptography. Retrieved from https://www.garykessler.net/library/crypto.html

If one is new to cryptograph, it takes some time for one to understand it. Maybe some hands-on practice will be helpful. You don't have to get it all figured out, but give it a try. You may find it interesting.

There's a program out there called Pretty Good Privacy (PGP), that provides personal encryption capabilities essentially equal to those available to almost all governments and capable of ensuring information privacy against almost if not absolutely all attacks. It has a long and interestingly checkered history, including having been at one time an illegal munition of war. Originating as freeware, it now exists in both free and commercial incarnations.

You'll also want to look at the discussion and links to some versions of the program on Phil Zimmermann's website (https://philzimmermann.com/EN/findpgp/) and at the GNU Privacy Guard website (https://www.gnupg.org/), which provides a free implementation on the Open Source model.

Now you have been exposed to technical solutions to security. Please also understand the challenges afflicated with technical solutions. The following article pinpoints the forever challenge to technology:

Schneier, B. (2012), How Changing Technology Affects Security. IEEE Security & Privacy. March/April 2012.

Is using an encryption system like PGP a good idea for individuals and organizations? And why?

Looking for:
Ability to consolidate ideas from reading materials.
Demonstration of understanding of cryptography and its role in network security.
Critical views on the advantages and disadvantages of technical solutions to security.

Solution Preview :

Prepared by a verified Expert
Computer Network Security: Critical views on the advantages and disadvantages of
Reference No:- TGS01260667

Now Priced at $30 (50% Discount)

Recommended (95%)

Rated (4.7/5)