Security 2

profilesponnapal5

Need answer for each of the following questions in a separate word document.


Topic: Managing information security


Question 1: Discuss the following in 200-300 words.


In your own words, explain what the following terms mean to you as they apply to information security and safe computing: Confidentiality, Integrity, and Availability. Why are these factors so important to businesses? 


Write in a word document.


Question 2: write this in attached sample summary (3 paragraph) format.

 

Select ONE ARTICLE from the following links and summarize the reading in your own words. Your summary should be 2-3 paragraphs in length and uploaded as a TEXT DOCUMENT. There is an EXAMPLE attached to show you the format requirements.

What is most important is that you use YOUR OWN WORDS to summarize the news article. It is essential that you do not copy text directly from the Internet. Plagiarism is unacceptable. You can easily avoid this by rephrasing the contents and summarizing it using your own words.

http://topics.nytimes.com/top/reference/timestopics/subjects/c/computer_security/index.html

https://www.lifewire.com/learn-how-antivirus-4102748

http://www.sans.org/newsletters/

http://news.cnet.com/security/
https://www.onlinesecurity.com/news--publications-page
http://www.esecurityplanet.com/views
http://netsecurity.about.com/

https://www.techrepublic.com/

Write in a word document.


Topic: Network Security


Question 3:  

Do the following review questions:

  • 2.1 What are the essential ingredients of a symmetric cipher?
  • 2.2 What are the two basic functions used in encryption algorithms?
  • 2.3 How many keys are required for two people to communicate via a symmetric cipher?
  • 2.4 What is the difference between a block cipher and a stream cipher?
  • 2.5 What are the two general approaches to attacking a cipher?
  • 2.6 Why do some block cipher modes of operation only use encryption while others use both encryption and decryption?
  • 2.7 What is triple encryption?
  • 2.8 Why is the middle portion of 3DES a decryption rather than an encryption?

Submit a Microsoft Word document

  • 5 years ago
  • 13
Answer(2)

Purchase the answer to view it

blurred-text
  • attachment
    Quiz3.docx
  • attachment
    The4scariesttypesofMalware.docx
  • attachment
    Confidentiality.docx

Purchase the answer to view it

blurred-text
NOT RATED
  • attachment
    Order10186798.docx