Access Control, Identity, and Cryptography

Intercultural Communication
January 21, 2020
Discussion 1: Ethical Leadership
January 21, 2020
Show all

Access Control, Identity, and Cryptography

READING MATERIAL
    Joseph Migga Kizza, Guide to Computer Network Security (4th Edition):
        – Chapter 9: Access Control and Authorization
        – Chapter 10: Authentication
        – Chapter 11: Cryptography

ASSIGNMENT 1 – Hash Algorithms

Write a one-page paper double spaced that you can upload (e.g., Microsoft Word file). Precede the answer with the question.

Using the Web, research and write a brief summary of one of the standard hash algorithms (SHA-1, MD5, etc), and answer the following:

What are some of its strengths? Weaknesses?

What have been some applications in the field of Information Security?

What made you choose this particular hash algorithm? 

Hint: choose one that you may know very little about to help you learn more about this critical piece of information security.

ASSIGNMENT 2 – E-commerce Authentication

Write a one-page paper to discuss the role of certificate authentication in e-commerce after reviewing this weeks reading material and videos.  How have you personally experienced the need to verify the legitimacy of a certificate in your own online communications, ie, browsing to various websites?

Leave a Reply

Your email address will not be published. Required fields are marked *