Security 2
sponnapal5Need answer for each of the following questions in a separate word document.
Topic: Managing information security
Question 1: Discuss the following in 200-300 words.
In your own words, explain what the following terms mean to you as they apply to information security and safe computing: Confidentiality, Integrity, and Availability. Why are these factors so important to businesses?
Write in a word document.
Question 2: write this in attached sample summary (3 paragraph) format.
Select ONE ARTICLE from the following links and summarize the reading in your own words. Your summary should be 2-3 paragraphs in length and uploaded as a TEXT DOCUMENT. There is an EXAMPLE attached to show you the format requirements.
What is most important is that you use YOUR OWN WORDS to summarize the news article. It is essential that you do not copy text directly from the Internet. Plagiarism is unacceptable. You can easily avoid this by rephrasing the contents and summarizing it using your own words.
http://topics.nytimes.com/top/reference/timestopics/subjects/c/computer_security/index.html
https://www.lifewire.com/learn-how-antivirus-4102748
http://www.sans.org/newsletters/
http://news.cnet.com/security/
https://www.onlinesecurity.com/news--publications-page
http://www.esecurityplanet.com/views
http://netsecurity.about.com/
https://www.techrepublic.com/
Write in a word document.
Topic: Network Security
Question 3:
Do the following review questions:
- 2.1 What are the essential ingredients of a symmetric cipher?
- 2.2 What are the two basic functions used in encryption algorithms?
- 2.3 How many keys are required for two people to communicate via a symmetric cipher?
- 2.4 What is the difference between a block cipher and a stream cipher?
- 2.5 What are the two general approaches to attacking a cipher?
- 2.6 Why do some block cipher modes of operation only use encryption while others use both encryption and decryption?
- 2.7 What is triple encryption?
- 2.8 Why is the middle portion of 3DES a decryption rather than an encryption?
Submit a Microsoft Word document
- 5 years ago
- 13
Purchase the answer to view it
- Quiz3.docx
- The4scariesttypesofMalware.docx
- Confidentiality.docx
Purchase the answer to view it
- Order10186798.docx
- QNT351 Week 1 DQ 2
- qnt 561_week_6_learning_team_business_research_methods_part_iii
- Current and Future Roles of Policing Presentation
- No copy and paste please... APA format with at least two references!!!
- Bus336
- ANT 101 Week 3 DQ 1 Social Organization
- MKT 421 Final Exam New
- HCS 531 Week 3 Individual Assignment Technology and Health Care Paper
- NRS-433V Module 5 DQ 2 - Characteristics of Nursing Research Utilization and Evidence-Based Practice
- industrial hyigene