Jul 17, 2017

Security via Technology

This paper concentrates on the primary theme of Security via Technology in which you have to explain and evaluate its intricate aspects in detail. In addition to this, this paper has been reviewed and purchased by most of the students hence; it has been rated 4.8 points on the scale of 5 points. Besides, the price of this paper starts from £ 40. For more details and full access to the paper, please refer to the site.

Security via Technology

INSTRUCTIONS:

Security via Technology





Assignment Overview



As mentioned in the module`s home page, the topic "Security via Technology" could be a course of its own. There is no way to cover virus protection, firewalls, anti-spam software, passwords, digital rights management, etc., in this one course. But we can focus on a general-purpose technology that can be applied in many security measures.



The following presentation covers the basic concept of cryptography. It can be hard to understand without explanation. Support your research by searching and reading on the Internet.



Wang, Wenli. PowerPoint presentation. Security via Cryptography.



The following simply write-up can help you too:



Wang, Wenli. A simple writing on What is encryption and SSL?



There is risk associated with any technological remedy to security problems. Read the following article from which you can learn about the subject from other angles.



Ellison C. and Schneier B. (2000) Ten Risks of PKI: What You`re Not Being Told About Public Key Infrastructure. Computer Security Journal, v 16, n 1, 2000, pp. 1-7. http://www.schneier.com/paper-pki.pdf.



This is the first time in this course that we look into details of a solution rather than take a bigger perspective. I hope you understand the difference between a macro approach and micro approach. They should be applied complementarily. As a manager or a policy maker, you should understand micro issues, but more importantly, you should have the bigger perspective. Technicians can handle the details. However, you need to understand their language and know what they mean rather than understand the details at the "buzzword" level.



So, as a manager and policy maker, let`s look into the bigger picture again. This time, let`s look at the past and future of information security:



Diffie, Whitfield. (2008) Information Security: 50 Years Behind, 50 Years Ahead. Communications of the ACM, 51(1), 55-57. (TUI online library)



You also need to keep yourself abreast of the new innovations and where to find them. The following two and the list I provided in the module`s home page are only the start. Visit these websites and bookmark the ones that you find interesting. Equipped with the frameworks and principles and several lenses, you can make your own judgment on the quality of an information source and know how that source focuses on different levels of analysis. 



Current activity report of the latest security incidents, US-CERT. Retrieved from http://www.us-cert.gov/ncas/current-activity



Computer Emergency Readiness Team Makes Progress in Securing Cyberspace, but Challenges Remain. (2010). Retrieved from http://www.oig.dhs.gov/assets/Mgmt/OIG_10-94_Jun10.pdf



Please write a 3- to 4-page paper discussing what you have learned:



Describe public-key cryptography and write a comparative analysis of its pros and cons. Provide a comparison of the pros and cons of solving security issues via technology. Discuss trends in information security technology and the impact they may have on society.



Use your own words. There are many sources on cryptography on the Internet. Do not cut and paste, but explain in your own words. Only in this way can you fully digest what you have learned. Write as if you are explaining the subject to your colleagues or co-workers.



When you discuss the trends in information security, use the suggested article as a reference. Your own opinions are always welcome. Please be clear, comprehensive, and in-depth.









Assignment Expectations (50 points total)



Length: Minimum 3–4 pages excluding cover page and references (since a page is about 300 words, this is approximately 900–1,200 words).



Assignment-driven criteria (25 points): Demonstrates clear understanding of the subject and addresses all key elements of the assignment.



Critical thinking (10 points): Demonstrates mastery conceptualizing the problem. Shows analysis, synthesis, and evaluation of required material.



Scholarly writing (5 points): Demonstrates writing proficiency at the academic level of the course; addresses the Learning Outcomes of the assignment.



Quality of references (4 points) and assignment organization (3 points): Uses relevant and credible sources to support assertions. Assignment is well organized and follows the structure of a well-written paper.



Citing sources (3 points): Uses in-text citations and properly formats references in APA style.

CONTENT:

Security via Technology Name: Course: Instructor’s Name: Date: Security via Technology Before investing in new security measures, consideration on the choice of the system and the technology requirement comes in handy depending on various factors such as finance, level of confidentiality and many others. Technology trends influence security in various ways through the internet that may result to strengthening the company security systems or wreaking it and thus creating loopholes. Success of businesses lies on the department of security, without super and active systems on security line the company may suffer badly on the hands of competitors and other watchdog bodies. The following security measure systems will focus on protecting information over the internet on the company market structure, business models, labor market, private life, education and the general society. Let us consider public-key cryptography What is public key cryptography? Public key cryptography use two separate keys where one is private and the other public. Public key cryptography, also asymmetric cryptography uses two non-identical mathematical keys to encrypt information. It is different from symmetric key, which uses only one key to encrypt and decrypt. The private key decry

...

100% Plagiarism Free & Custom Written,
Tailored to your instructions


International House, 12 Constance Street, London, United Kingdom,
E16 2DQ

UK Registered Company # 11483120


100% Pass Guarantee

Order Now

STILL NOT CONVINCED?

We've produced some samples of what you can expect from our Academic Writing Service - these are created by our writers to show you the kind of high-quality work you'll receive. Take a look for yourself!

View Our Samples

FLAT 25% OFF ON EVERY ORDER.Use "FLAT25" as your promo code during checkout