Select Page

New England College Week 3 Data Security Policy Resources Discussion

Question Description

Week 3 – Discussion

If you were asked by your employer to develop a new Information Security Policy, where would you turn to find resources to build this policy? List the two most important items you would include in this new policy and explain why you felt these were most important.

Number of words should be 300 words

Required Readings

Attached Files:

This week we will explore the 12 basic principles of information security. You will be exposed to the importance of taking a principles-based approach to risk management, as well as the primary goals of information security. In addition, this lecture will help you to understand the problems we are facing in the realm of information security management.

Week 3 Assignment

  • 3.1 List three approaches to message authentication.
  • 3.2 What is a message authentication code?
  • 3.4 What properties must a hash function have to be useful for message authentication?
  • 3.5 In the context of a hash function, what is a compression function?
  • 3.6 What are the principal ingredients of a public-key cryptosystem?
  • 3.7 List and briefly define three uses of a public-key cryptosystem.
  • 3.8 What is the difference between a private key and a secret key?
  • 3.9 What is a digital signature?

"Place your order now for a similar assignment and have exceptional work written by our team of experts, guaranteeing you "A" results."

Order Solution Now