READING MATERIAL
Joseph Migga Kizza, Guide to Computer Network Security (4th Edition):
– Chapter 9: Access Control and Authorization
– Chapter 10: Authentication
– Chapter 11: Cryptography
We Write Essays for Students
Tell us about your assignment and we will find the best writer for your paper
Get Help Now!ASSIGNMENT 1 – Hash Algorithms
Write a one-page paper double spaced that you can upload (e.g., Microsoft Word file). Precede the answer with the question.
Using the Web, research and write a brief summary of one of the standard hash algorithms (SHA-1, MD5, etc), and answer the following:
What are some of its strengths? Weaknesses?
What have been some applications in the field of Information Security?
What made you choose this particular hash algorithm?
Hint: choose one that you may know very little about to help you learn more about this critical piece of information security.
ASSIGNMENT 2 – E-commerce Authentication
Write a one-page paper to discuss the role of certificate authentication in e-commerce after reviewing this weeks reading material and videos. How have you personally experienced the need to verify the legitimacy of a certificate in your own online communications, ie, browsing to various websites?
The post Access Control, Identity, and Cryptography appeared first on Timely Writings.
Welcome to originalessaywriters.com, our friendly and experienced essay writers are available 24/7 to complete all your assignments. We offer high-quality academic essays written from scratch to guarantee top grades to all students. All our papers are 100% plagiarism-free and come with a plagiarism report, upon request
Tell Us “Write My Essay for Me” and Relax! You will get an original essay well before your submission deadline.
