Cryptography

Portfolio Assignment Background:  Assume that there has been a data breach at your organization.  The root cause was one of the following:  Insufficient or weak user authentication, deliberate actions of a disgruntled employee, a server that was missing a critical security patch for 90 days, or a misconfigured SaaS program that was unknown to the … Read more

Cryptography

In the second milestone writing assignment, you will analyze asymmetric and symmetric encryption. Evaluate the differences between the two of them and which one that you would determine is the most secure. At first glance, the key wrapping approach to encrypting symmetric keys for key management applications seems unnecessarily elaborate. The alternative would be a … Read more