subject

Instructions:

match common encryption algorithms and methods with the scenarios representing real-world business applications and requirements. you may use the course textbook and the internet to research encryption algorithms and methods.

common encryption algorithms and methods:

data encryption standard (des)

rivest, shamir, and adleman (rsa) encryption algorithm

triple des

diffie-hellman key exchange

elliptic curve cryptography (ecc)

blowfish

secure sockets layer (ssl)

transport layer security (tls)

advanced encryption standard (aes)

digital signature

scenarios:

encryption algorithm/method

scenario

top ads is a small advertising company consisting of 12 computers that have internet access. all employees communicate using smartphones. top ads' primary concern is protecting the data on the smartphones. select an encryption solution that best protects the smartphones and justify the recommendation.

shovels and shingles is a small construction company consisting of 1 multi-purpose server and 25 networked workstations. all employees have internet access and use email. a few employees use tablet pcs in the field. the company's biggest concern is that a wily competitor will send email messages pretending to be from shovels and shingles in order to get confidential information. select an encryption solution that best prevents a competitor from receiving confidential information and justify the recommendation.

netsecit is a multinational it services company consisting of 120,000 computers that have internet access and 45,000 servers. all employees communicate using smartphones and email. many employees work from home and travel extensively. netsecit would like to implement an asymmetric general-purpose encryption technology that is very difficult to break and has a compact design so that there is not a lot of overhead. select an encryption solution that best meets the company's needs and justify the recommendation.

backordered parts is a defense contractor that builds communications parts for the military. the employees use mostly web-based applications for parts design and information sharing. due to the sensitive nature of the business, backordered parts would like to implement a solution that secures all browser connections to the web servers. select an encryption solution that best meets the company's needs and justify the recommendation.

confidential services inc. is a military support branch consisting of 14,000,000 computers with internet access and 250,000 servers. all employees must have security clearances. they communicate mainly through internally secured systems. confidential services inc. is concerned that sensitive information may inadvertently be exposed and wants to implement a symmetric file encryption algorithm that is strong but fast. select an encryption solution that best meets the company's needs and justify the recommendation.

ansver
Answers: 1

Another question on Computers and Technology

question
Computers and Technology, 22.06.2019 05:00
Write a loop that reads positive integers from standard input and that terminates when it reads an integer that is not positive. after the loop terminates, it prints out, on a line by itself and separated by spaces, the sum of all the even integers read, the sum of all the odd integers read, a count of the number of even integers read, and a count of the number of odd integers read, all separated by at least one space. declare any variables that are needed. assume the availability of a variable, stdin, that references a scanner object associated with standard input. that is, stdin = new scanner(system.in); is given.
Answers: 3
question
Computers and Technology, 24.06.2019 11:20
William travels a lot on business purpose. he needs to regularly communicate with his business partner. he also needs to send out weekly reports to his boss while he is traveling. which web-based application best suits william’s needs? (social media, webmail, wiki) is the best web-based application for william. he can access this application via the internet using a (digital cable, fax machine, web browser).
Answers: 1
question
Computers and Technology, 24.06.2019 23:30
Which example can be considered master data in an organization? a. holiday list b. dress code c. employee information d. recreational activities
Answers: 1
question
Computers and Technology, 25.06.2019 06:30
Which component is typically used as an amplifier a battery a transistor a microchip a diode
Answers: 1
You know the right answer?
Instructions:

match common encryption algorithms and methods with the scenarios repres...
Questions
question
English, 28.11.2020 22:10
question
Computers and Technology, 28.11.2020 22:10
Questions on the website: 13722359