Encryption
- Write 4–6 pages that describe the encryption-related functions available to the business in the case study that support the security and efficiency of its new network.
-
- Describe the different forms of encryption most commonly applied in specific situations, including:
- Access controls, flow control, cryptography, firewalls, intrusion detection systems, et cetera.
- Applications of cryptography (National Centers of Academic Excellence in Information Assurance/Cyber Defense, 2013).
- Hashing and encryption.
- Cryptography.
- For integrity.
- Certificates.
- Public key infrastructure.
- Symmetric cryptography (DES, Twofish).
- Describe the information flow between databases and servers, and applications
- Describe the role that encryption plays in securing these information flows.
- Analyze hashing and encryption properties and applications, including:
- Classical cryptanalysis (a la Konheim).
- Hashing and signatures.
- Collision resistance.
- Cryptography.
- Hashing and encryption.
- Explain how encryption can contribute to mitigating risks due to inference and aggregation.
- Discuss the history of encryption from DES through AES.
- Differentiate between symmetric and asymmetric encryption methodologies.
- Describe commonly used examples of symmetric encryption.
- Describe commonly used examples of asymmetric encryption.
Additional Requirements
- Written communication: Written communication is free of errors that detract from the overall message.
- APA formatting: Use current APA style and formatting guidelines.
- Length: 4–6 pages, excluding the references page.
- Font and font size: Times New Roman, 12 point.
Reference
National Centers of Academic Excellence in Information Assurance/Cyber Defense (IA/CD). (2013). CAE knowledge units. Retrieved from http://www.cisse.info/pdf/2014/2014%20CAE%20Knowle…
- Describe the different forms of encryption most commonly applied in specific situations, including:
Criteria | Non-performance | Basic | Proficient | Distinguished |
---|---|---|---|---|
Describe different forms of encryption. |
Does not describe different forms of encryption. | Describes, incompletely or inaccurately, different forms of encryption. | Describes different forms of encryption. | Describes different forms of encryption, including the use of supporting examples |
Describe the information flow between databases/servers and applications. |
Does not describe the information flow between databases/servers and applications. | Describes incompletely or inaccurately the information flow between databases/servers and applications. | Describes the information flow between databases/servers and applications. | Describes the information flow between databases/servers and applications, including the use of supporting examples. |
Describe the role that encryption plays in security information flows. |
Does not describe the role that encryption plays in security information flows. | Describes incompletely or inaccurately the role that encryption plays in security information flows. | Describes the role that encryption plays in security information flows. | Describes the role that encryption plays in security information flows, including the use of supporting examples. |
Analyze hashing and encryption properties and applications. |
Does not analyze hashing and encryption properties and applications. | Analyzes incompletely or inaccurately hashing and encryption properties and applications. | Analyzes hashing and encryption properties and applications. | Analyzes hashing and encryption properties and applications, including the use of supporting examples. |
Explain how encryption can contribute to mitigating risks due to inference and aggregation. |
Does not explain how encryption can contribute to mitigating risks due to inference and aggregation. | Explains incompletely or inaccurately how encryption can contribute to mitigating risks due to inference and aggregation. | Explains how encryption can contribute to mitigating risks due to inference and aggregation. | Explains how encryption can contribute to mitigating risks due to inference and aggregation, including the use of supporting examples. |
Discuss the history of encryption from DES through AES. |
Does not discuss the history of encryption from DES through AES. | Discusses incompletely or inaccurately the history of encryption from DES through AES. | Discusses the history of encryption from DES through AES. | Discusses the history of encryption from DES through AES, including the use of supporting examples. |
Differentiate between symmetric and asymmetric encryption methodologies. |
Does not differentiate between symmetric and asymmetric encryption methodologies. | Differentiates incompletely or inaccurately between symmetric and asymmetric encryption methodologies. | Differentiates between symmetric and asymmetric encryption methodologies. | Differentiates between symmetric and asymmetric encryption methodologies, including the use of supporting examples. |
Describe commonly used examples of symmetric encryption. |
Does not describe commonly used examples of symmetric encryption. | Describes, incompletely or inaccurately, commonly used examples of symmetric encryption. | Describes commonly used examples of symmetric encryption. | Describes commonly used examples of symmetric encryption, including the use of supporting examples. |
Describe commonly used examples of asymmetric encryption. |
Does not describe commonly used examples of asymmetric encryption. | Describes, incompletely or inaccurately, commonly used examples of asymmetric encryption. | Describes commonly used examples of asymmetric encryption. | Describes commonly used examples of asymmetric encryption, including the use of supporting examples. |