UM The Cryptographic Algorithms & Symmetric Key Cryptography Discussion
Question Description
1. Cryptographic algorithms provide the underlying tools to most securityprotocols used in todays infrastructures. The choice of which type ofalgorithm depends on the goal that you are trying to accomplish, such asencryption or data integrity. These algorithms fall into two main categories:symmetric key and asymmetric key cryptography. In this essay, pleasediscuss the strengths and weaknesses of symmetric key cryptography andgive an example of where this type of cryptography is used. Then discussthe strengths and weaknesses of asymmetric key cryptography and give anexample of where this type of cryptography is used.2. Cryptography has been used in one form or another for over 4000 yearsand attacks on cryptography have been occurring since its inception. Thetype of people attempting to break the code could be malicious in theirintent or could just be trying to identify weaknesses in the security so thatimprovements can be made. In your essay response, define cryptanalysisand describe some of the common cryptanalytic techniques used in attacks.3. Many people overlook the importance of physical security when addressingsecurity concerns of the organization. Complex cryptography methods,stringent access control lists, and vigilant intrusion detection/preventionsoftware will be rendered useless if an attacker gains physical access toyour data center. Site and facility security planning is equally important tothe technical controls that you implement when minimizing the access acriminal will have to your assets. In your essay response, define CPTED anddescribe how following the CPTED discipline can provide a more aestheticalternative to classic target hardening approaches. Make sure that thethree CPTED strategies are covered in your response.
Have a similar assignment? "Place an order for your assignment and have exceptional work written by our team of experts, guaranteeing you A results."