Describe one situation where it is most appropriate to use symmetric encryption and one situation where it is most appropriate to use asymmetric
Describe one situation where it is most appropriate to use symmetric encryption and one situation where it is most appropriate to use asymmetric encryption. Justify your choices.
In response to your peers, select one of the situations described by a peer and think about a way that you could increase the overall security measures of the situation. Use a systems thinking approach, and think outside of the box!
To complete this assignment, review the Discussion Rubric.
RESPONSE ONE
A situation where symmetric encryption would be appropriate would be securing data backups. Leveraging Advanced Encryption Standard (AES) algorithms to secure data-at-rest would give more benefit than using asymmetric encryption. Modern CPU's have AES acceleration which allows you to preform AES operations much faster than others. These accelerators makes using AES more attractive for things requiring speed.
I have used asymmetric encryption where you need additional features with encryption such as authentication or when you can not deliver a symmetric key securely. An example of this is Public Key Infrastructure (PKI). With PKI each entity has a private and public key, the public keys are published to a database that can be looked up easily. If Bob wants to send a secret message to Alice, Bob would look up Alice's public key and encrypt the message. Once encrypted with Alice's public key, she will send it to Bob. Only Bob's private key can decrypt the message. Bob could also post a message publicly with a encrypted hash of the message. Any one who wants to authenticate that Bob's private key was the one what created the signature could use his public key to do so.
RESPONSE TWO
One situation where symmetric encryption is appropriate is protecting a sensitive document stored locally on your computer, such as spreadsheet containing personally identifiable information (PII). In this case, using a file encryption tool (like WinZip or WinRAR) that relies on symmetric encryption makes sense because it is efficient and fast. The file is encrypted with a key (a password). That key is also used for decryption. Symmetric encryption makes a lot of sense in situations where one person is doing the encrypting and decrypting because there is a single key.
Sending emails securely is an ideal scenario for using asymmetric encryption. A common practice today is that users in an organization are issued public and private keys which allows asymmetric encryption. If I want to send an email to a coworker, I use his or her public key to encrypt the message. Since only the recipient's private key can decrypt that message, I can be confident that no one else can read the message. The encrypted message would be useless to an attacker who does not possess the private key. In this same scenario, asymmetric encryption allows for digital signatures which verify that a message comes from the digital signer. They also encrypt a files hash with a private key, guaranteeing integrity (Badman & Kosinski, 2024).
Undergraduate Discussion Rubric
Overview
Your ac�ve par�cipa�on in the discussions is essen�al to your overall success this term. Discussion ques�ons will help you make meaningful connec�ons between the course content and
the larger concepts of the course. These discussions give you a chance to express your own thoughts, ask ques�ons, and gain insight from your peers and instructor.
Directions
For each discussion, you must create one ini�al post and follow up with at least two response posts.
For your ini�al post, do the following:
Write a post of 1 to 2 paragraphs.
In Module One, complete your ini�al post by Thursday at 11:59 p.m. Eastern.
In Modules Two through Eight, complete your ini�al post by Thursday at 11:59 p.m. of your local �me zone.
Consider content from other parts of the course where appropriate. Use proper cita�on methods for your discipline when referencing scholarly or popular sources.
For your response posts, do the following:
Reply to at least two classmates outside of your own ini�al post thread.
In Module One, complete your two response posts by Sunday at 11:59 p.m. Eastern.
In Modules Two through Eight, complete your two response posts by Sunday at 11:59 p.m. of your local �me zone.
Demonstrate more depth and thought than saying things like “I agree” or “You are wrong.” Guidance is provided for you in the discussion prompt.
Discussion Rubric
Criteria Exemplary Proficient Needs Improvement Not Evident Value
Comprehension Develops an ini�al post with an
organized, clear point of view
or idea using rich and
significant detail (100%)
Develops an ini�al post with a
point of view or idea using
adequate organiza�on and
detail (85%)
Develops an ini�al post with a
point of view or idea but with
some gaps in organiza�on and
detail (55%)
Does not develop an ini�al
post with an organized point of
view or idea (0%)
40
Timeliness N/A Submits ini�al post on �me
(100%)
Submits ini�al post one day
late (55%)
Submits ini�al post two or
more days late (0%)
10
10/30/24, 10:53 AM Undergraduate Discussion Rubric – CYB-250-15105-M01 Cyber Defense 2024 C-6 (Oct – Dec)
https://learn.snhu.edu/d2l/le/content/1748997/viewContent/36623160/View 1/2
Criteria Exemplary Proficient Needs Improvement Not Evident Value
Engagement Provides relevant and
meaningful response posts
with clarifying explana�on and
detail (100%)
Provides relevant response
posts with some explana�on
and detail (85%)
Provides somewhat relevant
response posts with some
explana�on and detail (55%)
Provides response posts that
are generic with li�le
explana�on or detail (0%)
30
Wri�ng (Mechanics) Writes posts that are easily
understood, clear, and concise
using proper cita�on methods
where applicable with no errors
in cita�ons (100%)
Writes posts that are easily
understood using proper
cita�on methods where
applicable with few errors in
cita�ons (85%)
Writes posts that are
understandable using proper
cita�on methods where
applicable with a number of
errors in cita�ons (55%)
Writes posts that others are
not able to understand and
does not use proper cita�on
methods where applicable (0%)
20
Total: 100%
10/30/24, 10:53 AM Undergraduate Discussion Rubric – CYB-250-15105-M01 Cyber Defense 2024 C-6 (Oct – Dec)
https://learn.snhu.edu/d2l/le/content/1748997/viewContent/36623160/View 2/2
Collepals.com Plagiarism Free Papers
Are you looking for custom essay writing service or even dissertation writing services? Just request for our write my paper service, and we'll match you with the best essay writer in your subject! With an exceptional team of professional academic experts in a wide range of subjects, we can guarantee you an unrivaled quality of custom-written papers.
Get ZERO PLAGIARISM, HUMAN WRITTEN ESSAYS
Why Hire Collepals.com writers to do your paper?
Quality- We are experienced and have access to ample research materials.
We write plagiarism Free Content
Confidential- We never share or sell your personal information to third parties.
Support-Chat with us today! We are always waiting to answer all your questions.