Standards, Security Protocols, and Wireless Security
READING (see attached file):
Joseph Migga Kizza, Guide to Computer Network Security (4th edition):
Chapter 16: Standardization and Security Criteria
Chapter 17: Computer Network Security Protocols
Chapter 18: Security in Wireless Networks and Devices
ARTICLES:
FIPS 1402 Requirements (See attached file)
Web and Network Communications(See attached file)
VIDEOS:
Kerberos – CompTIA Security+ SY0-401: 5.1
https://www.youtube.com/watch?v=VpBCJ8vS7T0
To see how SSL works with HTTP
https://www.youtube.com/watch?v=iQsKdtjwtYI
TEDxMidAtlantic 2011 – Avi Rubin – All Your Devices Can Be Hacked
https://www.youtube.com/watch?v=metkEeZvHTg
ASSIGNMENT 1 – Experience with Security Protocols (One-page)
Using this weeks reading material. In your own experience in your daily activities, think of when you have interacted with security protocols, ie, policies at work or school, online activities? Share a few sentences about your experiences. No PII please.
ASSIGNMENT 2 – WiFi Security Best Practices (Two-pages)
Using this week’s reading material. Suggest one best practice for wireless security and explain your choice. There are many, so try to not duplicate another students suggestion.
Collepals.com Plagiarism Free Papers
Are you looking for custom essay writing service or even dissertation writing services? Just request for our write my paper service, and we'll match you with the best essay writer in your subject! With an exceptional team of professional academic experts in a wide range of subjects, we can guarantee you an unrivaled quality of custom-written papers.
Get ZERO PLAGIARISM, HUMAN WRITTEN ESSAYS
Why Hire Collepals.com writers to do your paper?
Quality- We are experienced and have access to ample research materials.
We write plagiarism Free Content
Confidential- We never share or sell your personal information to third parties.
Support-Chat with us today! We are always waiting to answer all your questions.