New England College Week 3 Data Security Policy Resources Discussion
Question Description
Week 3 – Discussion
If you were asked by your employer to develop a new Information Security Policy, where would you turn to find resources to build this policy? List the two most important items you would include in this new policy and explain why you felt these were most important.
Number of words should be 300 words
Required Readings
Attached Files:
merkow_ppt_02 f.ppt (354.5 KB)
This week we will explore the 12 basic principles of information security. You will be exposed to the importance of taking a principles-based approach to risk management, as well as the primary goals of information security. In addition, this lecture will help you to understand the problems we are facing in the realm of information security management.
Week 3 Assignment
- 3.1 List three approaches to message authentication.
- 3.2 What is a message authentication code?
- 3.4 What properties must a hash function have to be useful for message authentication?
- 3.5 In the context of a hash function, what is a compression function?
- 3.6 What are the principal ingredients of a public-key cryptosystem?
- 3.7 List and briefly define three uses of a public-key cryptosystem.
- 3.8 What is the difference between a private key and a secret key?
- 3.9 What is a digital signature?
"Place your order now for a similar assignment and have exceptional work written by our team of experts, guaranteeing you "A" results."