Private key usage

Private key usage involves a basic concept such as a password. What are the characteristics required in using a password that will provide security protection for a company? Name and describe all the elements of a PKI. Why would a small to medium sized firm implement...

Types of cryptographic algorithm

This week reading focused on three types of cryptographic algorithms: (1) Secret key, (2) Public key, (3) Hash functions. Pick an algorithm for any one of these types (e.g., DES, AES, RSA, MD5) and write a research paper to describe how it works and where it is...

Johari window and transactional analysis

For this assignment you will be applying the concepts of the Johari Window and Transactional Analysis to some specific scenarios that you might face if you were a leadership development coach. Of course make sure to thoroughly review the required readings before...

Office 365 Phishing attacks

This assignment will be based on the following news article: Ragan, S 2017 ‘Office 365 Phishing attacks create a sustained insider nightmare for IT’, CSO Online, 20 September, Answer the following questions in relation to the news article. Assume that the...

Cultural values of a country

In particular, please work to find at least three important cultural values that are said to characterize your country. Try to find some specific behaviors that follow from these values/behaviors you could observe if you visited that country. These values and...