Usetutoringspotscode to get 8% OFF on your first order!

  • time icon24/7 online - support@tutoringspots.com
  • phone icon1-316-444-1378 or 44-141-628-6690
  • login iconLogin

Access Control, Identity, and Cryptography

READING MATERIAL
    Joseph Migga Kizza, Guide to Computer Network Security (4th Edition):
        – Chapter 9: Access Control and Authorization
        – Chapter 10: Authentication
        – Chapter 11: Cryptography

ASSIGNMENT 1 – Hash Algorithms

Write a one-page paper double spaced that you can upload (e.g., Microsoft Word file). Precede the answer with the question.

Using the Web, research and write a brief summary of one of the standard hash algorithms (SHA-1, MD5, etc), and answer the following:

What are some of its strengths? Weaknesses?

What have been some applications in the field of Information Security?

What made you choose this particular hash algorithm? 

Hint: choose one that you may know very little about to help you learn more about this critical piece of information security.

ASSIGNMENT 2 – E-commerce Authentication

Write a one-page paper to discuss the role of certificate authentication in e-commerce after reviewing this weeks reading material and videos.  How have you personally experienced the need to verify the legitimacy of a certificate in your own online communications, ie, browsing to various websites?

You can leave a response, or trackback from your own site.

Leave a Reply

Powered by WordPress | Designed by: Premium WordPress Themes | Thanks to Themes Gallery, Bromoney and Wordpress Themes