Access Control, Identity, and Cryptography
READING MATERIAL
Joseph Migga Kizza, Guide to Computer Network Security (4th Edition):
– Chapter 9: Access Control and Authorization
– Chapter 10: Authentication
– Chapter 11: Cryptography
ASSIGNMENT 1 – Hash Algorithms
Write a one-page paper double spaced that you can upload (e.g., Microsoft Word file). Precede the answer with the question.
Using the Web, research and write a brief summary of one of the standard hash algorithms (SHA-1, MD5, etc), and answer the following:
What are some of its strengths? Weaknesses?
What have been some applications in the field of Information Security?
What made you choose this particular hash algorithm?
Hint: choose one that you may know very little about to help you learn more about this critical piece of information security.
ASSIGNMENT 2 – E-commerce Authentication
Write a one-page paper to discuss the role of certificate authentication in e-commerce after reviewing this weeks reading material and videos. How have you personally experienced the need to verify the legitimacy of a certificate in your own online communications, ie, browsing to various websites?
Collepals.com Plagiarism Free Papers
Are you looking for custom essay writing service or even dissertation writing services? Just request for our write my paper service, and we'll match you with the best essay writer in your subject! With an exceptional team of professional academic experts in a wide range of subjects, we can guarantee you an unrivaled quality of custom-written papers.
Get ZERO PLAGIARISM, HUMAN WRITTEN ESSAYS
Why Hire Collepals.com writers to do your paper?
Quality- We are experienced and have access to ample research materials.
We write plagiarism Free Content
Confidential- We never share or sell your personal information to third parties.
Support-Chat with us today! We are always waiting to answer all your questions.