• help@unquite.com
  • +1 302 231 1203

QUESTION'S DESCRIPTION

Question Posted By

Online
  • James
  • Questions : 36
  • Solutions : 226

Question Description

CIS 560 Week 6 Assignment 3 and Discussion

CIS 560 Week 6 Assignment 3: Secure Encrypted Communications

Transmitting personal and business data and information over secure communication channels is critical. In some cases it is required, especially when personally identifiable information is being transmitted. Credit card numbers, Social Security Numbers, online purchases, business orders, and so on must all be transmitted over secure communication channels. The Public Key Infrastructure (PKI) provides the most widely used secure communications technology. PKI relies on encryption.

Write a four to five (4-5) page paper in which you:

  1. Compare and contrast symmetric encryption to asymmetric encryption.
  2. PKI uses digital certificates to encrypt / decrypt data. Analyze the process of encrypting and decrypting data using a digital certificate. 
  3. Evaluate the advantages and disadvantages of using digital certificates.
  4. Evaluate the challenges related to public and private key management when using PKI.

Use at least three (3) quality resources in this assignment. Note: Wikipedia and similar Websites do not qualify as quality resources.

CIS 560 Week 6 Discussion

"Access Control and VPN " Please respond to the following:

  • Suppose you work for a company that wants to implement a Virtual Private Networks (VPN) for telecommuters. Determine which tunneling protocol you would recommend and explain why.
  • Our text discusses concepts like identification, authentication, authorization, and accounting in the context of access control and policy. As an IT security manager, which of these would you likely focus on for your organization and why? 
  • Encryption is a necessary security tool, but there is also overhead involved.   Again, as IT security manager, under what conditions should you be sure to use encryption as a security measure?

 

 


Available Solutions
JOIN OUR NEWLETTER

Be the first to receive exciting news,features and special offers from Minds Blow

Copyrights © 2016 | Unquite.com is a Part of Minds Blow LLC and All Rights Reserved With Minds Blow LLC

Uploading copyrighted material is strictly prohibited. Refer to our DMCA Policy for more information.

This is an online marketplace for tutorials and study guides. All the content is provided by third parties and unquite.com is not liable for the similarity.