Friday, 26 April 2019

CIS 502 Week 3 Discussion Question

CIS 502 Week 3 Discussion Question



Cryptography Keys
Cryptography provides confidentiality, integrity authentication, and nonrepudiation for sensitive information while it is stored (at rest), traveling across a network (in transit), and existing in memory (in use). Cryptography keys play in the world of data security and are an extremely important security technology embedded in many of the security controls used to protect information from unauthorized visibility and use. 
Let’s say you work for one of the following types of industry:
  • Manufacturing 
  • Government 
  • Research 
  • Service 
  • Consulting 
After you choose one of the above, consider the three types of algorithms commonly used today. Which do you find to be the most secure? Which is the most complex? Which did you struggle to understand? What do you think you need to know as a manager in order to choose the right security systems for your company?  Be sure to fully develop your responses and support your opinion with reasons from your study this week.



https://hwacer.com/Tutorial/cis-502-week-3-discussion-question/






Cryptography Keys
Cryptography provides confidentiality, integrity authentication, and nonrepudiation for sensitive information while it is stored (at rest), traveling across a network (in transit), and existing in memory (in use). Cryptography keys play in the world of data security and are an extremely important security technology embedded in many of the security controls used to protect information from unauthorized visibility and use. 
Let’s say you work for one of the following types of industry:
  • Manufacturing 
  • Government 
  • Research 
  • Service 
  • Consulting 
After you choose one of the above, consider the three types of algorithms commonly used today. Which do you find to be the most secure? Which is the most complex? Which did you struggle to understand? What do you think you need to know as a manager in order to choose the right security systems for your company?  Be sure to fully develop your responses and support your opinion with reasons from your study this week.

Cryptography Keys
Cryptography provides confidentiality, integrity authentication, and nonrepudiation for sensitive information while it is stored (at rest), traveling across a network (in transit), and existing in memory (in use). Cryptography keys play in the world of data security and are an extremely important security technology embedded in many of the security controls used to protect information from unauthorized visibility and use. 
Let’s say you work for one of the following types of industry:
  • Manufacturing 
  • Government 
  • Research 
  • Service 
  • Consulting 
After you choose one of the above, consider the three types of algorithms commonly used today. Which do you find to be the most secure? Which is the most complex? Which did you struggle to understand? What do you think you need to know as a manager in order to choose the right security systems for your company?  Be sure to fully develop your responses and support your opinion with reasons from your study this week.
CIS 502 Week 3 Discussion Question

No comments:

Post a Comment

Note: only a member of this blog may post a comment.

FIN 317 Financing an Expansion Assignment

  FIN 317 Financing an Expansion Assignment   Financing an Expansion Overview After 12 years, your business is wildly successful, with multi...