Discuss about cryptographic functions


Assignment:

Devotional

1. Be sure to address to the following prompts in your paper:

a. Considering your religious/cultural background, what do you see as God's role in our security efforts?

b. What does the Bible say we need to do for God's blessing?

c. How would you apply the principles of these verses in your workplace?

2. Your paper should be at least 250 words in length.

1. Discussion: Textbook Reading

Resources

• Textbook: Principles of Computer Security: CompTIA Security and Beyond

1. Read your textbook.

2. Using the discussion link below, respond to the following questions:

a. What was the most useful takeaway for you from this workshop's reading?

b. What concept from the reading is the most applicable to you now in your profession, and how might you implement it?

2. Discussion: Cryptographic Functions

1. Using the discussion link below, respond to the following prompts and questions:

a. Classify the types of cryptographic methods that are currently in use and describe their functionality.

b. What function does PKI play in secure transactions? Discuss any issues with the use of PKI.

c. Discuss why physical security is important. Select several physical security measures and provide reasoning for their implementation.

2. Your initial post should be at least 300 words and supported with at least three references.

Assignment: Threat Analysis (Phase 1 of Final Project)

1. Phase 1 of Final Project: Develop a comprehensive analysis that identifies threats and vulnerabilities to the information systems infrastructure and organizational data.

2. You may use a fictitious company, one that you researched on the Internet, or your own workplace (although you should use an alias for the company name).

3. Conduct Internet research for formats that are used for a threat analysis.

a. Include a short executive summary for this assignment, although you will need to revise this summary for the final paper.

b. The threat analysis should be approximately 4 to 5 pages in length, in APA format, and double-spaced for the narrative.

c. You may use tables or other graphic representations.

d. The paper should include references to any material used in preparing the paper. References are to be cited within your paper as well as on the Reference page using APA format.

e. You should use online resources to develop your plans; just make sure to cite these sources. All written work should be your own.

f. Consider using Grammarly before you submit your paper. Grammarly checks grammar, provides suggestions for corrections, and reviews references.

Discussion: Understanding the Cybersecurity Landscape

1. Conduct a critical analysis of two of your classmates' posts by the last day of the workshop.

2. Each response to your classmates should be at least 150 words in length and include a citation to one credible information source.

Solution Preview :

Prepared by a verified Expert
Computer Network Security: Discuss about cryptographic functions
Reference No:- TGS03161524

Now Priced at $70 (50% Discount)

Recommended (92%)

Rated (4.4/5)