Order ID:89JHGSJE83839 | Style:APA/MLA/Harvard/Chicago | Pages:5-10 |
Instructions:
Information Security and Cryptographic Algorithms
Cryptographic Algorithms (Part 1)
The focus of this week’s reading was on three different types of cryptographic algorithms: (1) Secret key, (2) Public key, and (3) Hash functions are the three types of keys. Choose one of these types of algorithm and explain how it works and where it is used in network security (e.g., DES, AES, RSA, MD5). (SSL, for example, encrypts messages with 3DES or DES.) Make up your own sentences. Try not to use the same algorithm twice.
Part 2: Information Security in the Big Picture
To some extent, cryptographic techniques secure data at rest and in transit. By encrypting data, you ensure that it can only be read by authorized users or systems. Similarly, implementing integrity measures like hashing and message authentication code ensures that no unauthorized changes were done. To put it another way, cryptography can be thought of as a form of access control. For total data security, cryptography alone is insufficient. A person could, for example, enter into your computer room and physically delete the data on your disk or other storage medium. A fire or a flood might completely ruin your computer room. Cryptography does not address the issue of availability. An insider can gain access to your computer systems and delete files or data rows from your database. So you’ll need physical security, as well as hard and soft authentication and permission restrictions. The following are the questions for the second half of the conference: What methods/facilities are available in today’s systems to secure data? Have these techniques proven to be effective? As a result, the second portion of this conference will look beyond cryptographic techniques and consider various types of information security protection.
RUBRIC |
||||||
Excellent Quality 95-100%
|
Introduction
45-41 points The background and significance of the problem and a clear statement of the research purpose is provided. The search history is mentioned. |
Literature Support 91-84 points The background and significance of the problem and a clear statement of the research purpose is provided. The search history is mentioned. |
Methodology 58-53 points Content is well-organized with headings for each slide and bulleted lists to group related material as needed. Use of font, color, graphics, effects, etc. to enhance readability and presentation content is excellent. Length requirements of 10 slides/pages or less is met. |
|||
Average Score 50-85% |
40-38 points More depth/detail for the background and significance is needed, or the research detail is not clear. No search history information is provided. |
83-76 points Review of relevant theoretical literature is evident, but there is little integration of studies into concepts related to problem. Review is partially focused and organized. Supporting and opposing research are included. Summary of information presented is included. Conclusion may not contain a biblical integration. |
52-49 points Content is somewhat organized, but no structure is apparent. The use of font, color, graphics, effects, etc. is occasionally detracting to the presentation content. Length requirements may not be met. |
|||
Poor Quality 0-45% |
37-1 points The background and/or significance are missing. No search history information is provided. |
75-1 points Review of relevant theoretical literature is evident, but there is no integration of studies into concepts related to problem. Review is partially focused and organized. Supporting and opposing research are not included in the summary of information presented. Conclusion does not contain a biblical integration. |
48-1 points There is no clear or logical organizational structure. No logical sequence is apparent. The use of font, color, graphics, effects etc. is often detracting to the presentation content. Length requirements may not be met |
|||
You Can Also Place the Order at www.collegepaper.us/orders/ordernow or www.crucialessay.com/orders/ordernow |
Information Security and Cryptographic Algorithms