Technology of Information Security

Technology of Information Security

Order 100% Plagiarism free paper

Case Assignment
Please prepare a 3- to 5-page paper addressing the question:
Is using an encryption system like PGP a good idea for individuals and organizations? And why?
Assignment Overview
To assure a trusted and resilient information and communications infrastructure, it is essential to secure the computer networks. Computer networks are implemented via technology. Part of solutions of their security in essence need to be via technology as well. The following two presentations provide the security protocols common in computer networks.
Kizza. Computer Network Security Protocols and Standards. Presentation.
Perlman, R. (2004), Network Security Protocols: A Tutorial. Presentation.
As you see from the presentations, to understand computer network security protocols, it is important to understand what cryptography is, as it is the building block of security protocols. The following reading provides a thorough review:
Kessler, G. (2011). An overview of cryptography. Retrieved from http://www.garykessler.net/library/crypto.html
If one is new to cryptograph, it takes some time for one to understand it. Maybe some hands-on practice will be helpful. You don’t have to get it all figured out, but give it a try. You may find it interesting.
There’s a program out there called Pretty Good Privacy (PGP), that provides personal encryption capabilities essentially equal to those available to almost all governments and capable of ensuring information privacy against almost if not absolutely all attacks. It has a long and interestingly checkered history, including having been at one time an illegal munition of war. Originating as freeware, it now exists in both free and commercial incarnations.
You’ll also want to look at the discussion and links to some versions of the program on Phil Zimmermann’s website (http://philzimmermann.com/EN/findpgp/) and at the GNU Privacy Guard website (http://www.gnupg.org/), which provides a free implementation on the Open Source model.
Now you have been exposed to technical solutions to security. Please also understand the challenges afflicated with technical solutions. The following article pinpoints the forever challenge to technology:
Schneier, B. (2012), How Changing Technology Affects Security. IEEE Security & Privacy. March/April 2012.
When you’ve had a chance to review these materials, do any other research on the topic that you find helpful, and think about the issues involved.
Case Assignment
Please prepare a 3- to 5-page paper addressing the question:
Is using an encryption system like PGP a good idea for individuals and organizations? And why?

source..

Get a 20 % discount on an
order above $ 120
Use the following coupon code :
today2015

error: Content is protected !!