Project #53074 - Security via Technology

Assignment Overview

As mentioned in the module's home page, the topic "Security via Technology" could be a course of its own. There is no way to cover virus protection, firewalls, anti-spam software, passwords, digital rights management, etc., in this one course. But we can focus on a general-purpose technology that can be applied in many security measures.

The following presentation covers the basic concept of cryptography. It can be hard to understand without explanation. Support your research by searching and reading on the Internet.

Wang, Wenli. PowerPoint presentation. Security via Cryptography.

The following simply write-up can help you too:

Wang, Wenli. A simple writing on What is encryption and SSL?

There is risk associated with any technological remedy to security problems. Read the following article from which you can learn about the subject from other angles.

Ellison C. and Schneier B.(2000) Ten Risks of PKI: What You're Not Being Told About Public Key Infrastructure. Computer Security Journal, v 16, n 1, 2000, pp. 1-7. http://www.schneier.com/paper-pki.pdf.

This is the first time in this course that we look into details of a solution rather than take a bigger perspective. I hope you understand the difference between a macro approach and micro approach. They should be applied complementarily. As a manager or a policy maker, you should understand micro issues, but more importantly, you should have the bigger perspective. Technicians can handle the details. However, you need to understand their language and know what they mean rather than understand the details at the "buzzword" level.

So, as a manager and policy maker, let's look into the bigger picture again. This time, let's look at the past and future of information security:

Diffie, Whitfield. (2008) Information Security: 50 Years Behind, 50 Years Ahead. Communications of the ACM, 51(1), 55-57. (TUI online library)

You also need to keep yourself abreast of the new innovations and where to find them. The following two and the list I provided in the module's home page are only the start. Visit these websites and bookmark the ones that you find interesting. Equipped with the frameworks and principles and several lenses, you can make your own judgment on the quality of an information source and know how that source focuses on different levels of analysis.

Current activity report of the latest security incidents, US-CERT. Retrieved from http://www.us-cert.gov/ncas/current-activity

Computer Emergency Readiness Team Makes Progress in Securing Cyberspace, but Challenges Remain. (2010). Retrieved from http://www.oig.dhs.gov/assets/Mgmt/OIG_10-94_Jun10.pdf

Please write a 3- to 4-page paper discussing what you have learned:

Describe public-key cryptography and write a comparative analysis of its pros and cons. Provide a comparison of the pros and cons of solving security issues via technology. Discuss trends in information security technology and the impact they may have on society.

Use your own words. There are many sources on cryptography on the Internet. Do not cut and paste, but explain in your own words. Only in this way can you fully digest what you have learned. Write as if you are explaining the subject to your colleagues or co-workers.

When you discuss the trends in information security, use the suggested article as a reference. Your own opinions are always welcome. Please be clear, comprehensive, and in-depth.

Length: Minimum 3–4 pages excluding cover page and references (since a page is about 300 words, this is approximately 900–1,200 words).

Assignment-driven criteria (25 points): Demonstrates clear understanding of the subject and addresses all key elements of the assignment.

Critical thinking (10 points): Demonstrates mastery conceptualizing the problem. Shows analysis, synthesis, and evaluation of required material.

Scholarly writing (5 points): Demonstrates writing proficiency at the academic level of the course; addresses the Learning Outcomes of the assignment.

Quality of references (4 points) and assignment organization (3 points): Uses relevant and credible sources to support assertions. Assignment is well organized and follows the structure of a well-written paper.

Citing sources (3 points): Uses in-text citations and properly formats references in APA style

 

Subject Computer
Due By (Pacific Time) 01/08/2015 12:00 am
Report DMCA
TutorRating
pallavi

Chat Now!

out of 1971 reviews
More..
amosmm

Chat Now!

out of 766 reviews
More..
PhyzKyd

Chat Now!

out of 1164 reviews
More..
rajdeep77

Chat Now!

out of 721 reviews
More..
sctys

Chat Now!

out of 1600 reviews
More..
sharadgreen

Chat Now!

out of 770 reviews
More..
topnotcher

Chat Now!

out of 766 reviews
More..
XXXIAO

Chat Now!

out of 680 reviews
More..
All Rights Reserved. Copyright by AceMyHW.com - Copyright Policy