Cash-back offer from May 7th to 12th, 2024: Get a flat 10% cash-back credited to your account for a minimum transaction of $50.Post Your Questions Today!

Question DetailsNormal
$ 25.00

Network and Internet Security Part 1: Cryptographic Algorithms,Part 2: Information Protection

Question posted by
Online Tutor Profile
request

Network and Internet Security

Part 1: Cryptographic Algorithms

This week reading focused on three types of cryptographic algorithms: (1) Secret key, (2) Public key, (3) Hash functions. Pick an algorithm for any one of these types (e.g., DES, AES, RSA, MD5) and describe how it works and where it is applied in network security. (For example SSL uses 3DES or DES for message encryption.) Use your own words. When you pick an algorithm, try not to repeat.

Part 2: Information Protection at Large

Cryptographic algorithms protect data at rest and during transit to some degree. By encrypting data, you are assuring that only authorized individuals or systems can read the data. Similarly by using integrity techniques such as hashing and message authentication code you are assuring no unauthorized person had made changes. In other words, you can think of cryptography as a means of access control. Cryptography alone is not sufficient for complete data protection. For example, a person can walk into your computer room and physically destroy your data in your disk and other storage medium. Your computer room can be destroyed by fire or flood. Cryptography certainly does not address availability concerns. An insider can log into your computer systems and delete files or a row of data in your database. So, you need physical security; you need authentication and authorization controls in both hard and soft forms. The questions for this second part of the conference then: What methods/facilities are available to secure data in today's systems? Have these methods proved to be adequate? So, this second part of this conference is to go beyond cryptographic techniques and think of other forms of protection information security needs.

You are encouraged to conduct research on your own and consult reputable sources.

Post your concise answers (in your own words) one for Part 1 and one or Part 2. as a reply to this conference topic. Don’t forget to list your sources. Also, respond in a few sentences to at least two of your colleagues' responses either for Part 1 or Part 2 or both.

 

Available Answer
$ 25.00

[Solved] Network and Internet Security Part 1: Cryptographic Algorithms,Part 2: Information Protection

  • This solution is not purchased yet.
  • Submitted On 19 Nov, 2017 07:37:04
Answer posted by
Online Tutor Profile
solution
Network and Internet Sec...
Buy now to view the complete solution
Other Similar Questions
User Profile
Acade...

Network and Storage

Network and Storage Network and Storage The Disaster Recovery Team Since all risks cannot be totally eliminated in practice, the fundamental basis of a Disaster Recovery Plan is that residual risks always remain. Despite t...
User Profile
sonim...

cmit 265 new question, Please read question

Physical Network Design: 1. Define the topology that will be used. It will be an extended star (tree) topology. 2. Select the appropriate network media to use. The best network media to use would be CAT6 STP. 3. Selec...
User Profile
termp...

IT278_Norris_Unit_3_Lab.docx Best Practices as a Network Administrator Purdue University

IT278_Norris_Unit_3_Lab.docx Best Practices as a Network Administrator Purdue University Global Best Practices as a Network Administrator As a network administrator, it is important to have a set list of best practices th...
User Profile
termp...

IT278__Unit_2_Lab.docx IT374 Unit 2 Lab Purdue Global University IT374 Network Admin

IT278__Unit_2_Lab.docx IT374 Unit 2 Lab Purdue Global University IT374 Network Administration Part 1 The installation process of Windows Server 2016 was pretty simple and straightforward thanks to the discussion post ...
User Profile
termp...

IT190_assignment7.docx(1) IT 190 Assignment 7 IT 190 Network architectures are the w

IT190_assignment7.docx(1) IT 190 Assignment 7 IT 190 Network architectures are the way in which a network has been designed; they are classified in several different ways, including the distance between nodes, the way i...

The benefits of buying study notes from CourseMerits

homeworkhelptime
Assurance Of Timely Delivery
We value your patience, and to ensure you always receive your homework help within the promised time, our dedicated team of tutors begins their work as soon as the request arrives.
tutoring
Best Price In The Market
All the services that are available on our page cost only a nominal amount of money. In fact, the prices are lower than the industry standards. You can always expect value for money from us.
tutorsupport
Uninterrupted 24/7 Support
Our customer support wing remains online 24x7 to provide you seamless assistance. Also, when you post a query or a request here, you can expect an immediate response from our side.
closebutton

$ 629.35