NT2580, Week 7 Text Sheet 2
3 Pages

NT2580, Week 7 Text Sheet 2

Course Number: INFOSECURI NT2580, Winter 2012

College/University: ITT Tech Flint

Word Count: 839

Rating:

Document Preview

<NAME> NT2580 11 February 2013 NT2580: Unit 7 Select Appropriate Encryption Algorithms Instructions: Match common encryption algorithms and methods with the scenarios representing real-world business applications and requirements. Common encryption algorithms and methods: Data Encryption Standard (DES) Rivest, Shamir, and Adleman (RSA) encryption algorithm Triple DES Diffie-Hellman key exchange...

Unformatted Document Excerpt
Coursehero >> Michigan >> ITT Tech Flint >> INFOSECURI NT2580

Course Hero has millions of student submitted documents similar to the one
below including study guides, practice problems, reference materials, practice exams, textbook help and tutor support.

Course Hero has millions of student submitted documents similar to the one below including study guides, practice problems, reference materials, practice exams, textbook help and tutor support.

<NAME> NT2580 11 February 2013 NT2580: Unit 7 Select Appropriate Encryption Algorithms Instructions: Match common encryption algorithms and methods with the scenarios representing real-world business applications and requirements. Common encryption algorithms and methods: Data Encryption Standard (DES) Rivest, Shamir, and Adleman (RSA) encryption algorithm Triple DES Diffie-Hellman key exchange International Data Encryption Algorithm (IDEA) El Gamal encryption algorithm Carlisle Adams and Stafford Taveres (CAST) algorithm Elliptic curve cryptography (ECC) Blowfish Secure Sockets Layer (SSL) Advanced Encryption Standard (AES) Digital signature Scenarios: 1. Shovels and Shingles is a small construction company consisting of 12 computers that have Internet access. The company's biggest concern is that a wily competitor will send e-mail messages pretending to be from Shovels and Shingles in order to get confidential information. Select an encryption solution that best prevents a competitor from receiving confidential information and justify the recommendation. My recommendations for this companys email concerns are the following algorithms; Rivest, Shamir, and Adleman (RSA) encryption algorithm Diffie-Hellman key exchange Secure Sockets Layer (SSL) The reasoning for this is that the RSA algorithm is considered the most common public key encryption algorithm that can be used for either digital signatures or for encryption. encryption algorithm that can be used for either digital signatures or for encryption.

Find millions of documents on Course Hero - Study Guides, Lecture Notes, Reference Materials, Practice Exams and more. Course Hero has millions of course specific materials providing students with the best way to expand their education.

Below is a small sample set of documents:

Northwestern - BIOL_SCI - 218
o-enol tautomerism of uracil.The Properties of Pyrimidines and Purines CanBe Traced to Their Electron-Rich NatureFigure 10.7 The tautomerization of the purine guanine.The Properties of Pyrimidines and Purines CanBe Traced to Their Electron-
Cincinnati - SOC - 5002
Education sociology health reviewCigarette SmokingTops list of preventable health hazards in U.S.Many smoke to cope with stressAbout 440,000 die prematurely yearlyExceeds alcohol, cocaine, heroin, homicide, suicide, autoaccidents, and AIDSIncreased
Austin Community College - SPEECH - 1311
)3. Bipolar questions- Many closed questions are bipolar, meaning that theylimit the respondent to one of two particular choices (e.g., Do you was with or withoutfabric softener, Do you agree or disagree with that?, Do you use the metro bus system
ITT Tech Flint - INFOSECURI - NT2580
&lt;NAME&gt;NT258015 December 2012NT2580: Unit 1 Match Risks/Threats to SolutionsInstructions:You are presented with a list of some risks and threats associated with the seven domains of a typical ITinfrastructure. Below the list, the solutions or prevent
ITT Tech Flint - INFOSECURI - NT2580
&lt;NAME&gt;NT258012 January 2013Unit 2 Assignment 1:Calculate the Window of VulnerabilityCalculation of the Window of Vulnerability0 day Day the breach was discovered was Friday by an unauthorized user.Day 4 Microsoft is contacted for availability of pa
ITT Tech Flint - INFOSECURI - NT2580
&lt;NAME&gt;NT258016 January 2013Unit 2 Assignment 2:Microsoft Environment Analysis1. The five vulnerabilities that I have found are as follows: Vulnerability in SSL/TLS Could Allow Information Disclosure TheCommon Vulnerability and Exposures (CVEs) advi
ITT Tech Flint - INFOSECURI - NT2580
&lt;NAME&gt;NT258019 January 2013Section NT2580Policy -Draft-01/19/1301/19/13&lt;NAME&gt;IS Security PoliciesRemote Access Standards-Effective-Revised-AuthorIntroductionThe Richman Investments network infrastructure is provided asa central utility for
ITT Tech Flint - INFOSECURI - NT2580
&lt;NAME&gt;NT258026 January 2013Unit 4 Assignment 2:Acceptable Use Policy (AUP) DefinitionThe companies that I have researched about their Acceptable Use Policy areAT&amp;T, Amazon Web Services, and CenturyLink.AT&amp;T LINKhttp:/www.corp.att.com/aup/AMAZON W
ITT Tech Flint - INFOSECURI - NT2580
&lt;NAME&gt;NT258026 January 2013Unit 5 Assignment 1:Testing and Monitoring Security ControlsTwo types of security events that might indicate suspicious activity on a networkare failed logins or After-hours logons to high-security systems. The two types o
ITT Tech Flint - INFOSECURI - NT2580
&lt;NAME&gt;NT258020 December 2012Week 1: NmapNmap has been around since 1997 and was originally developed as a Linux port scanneronly. Since then it has evolved into much more with the help of hard working individuals thatbelieve that software should be
ITT Tech Flint - INFOSECURI - NT2580
&lt;NAME&gt;NT258019 January 2013NT2580: Unit 4 Security Operations and Administration Roles andResponsibilitiesInstructions:In the following table, enter a number in the Answers column for each role that matches its appropriatedescription. A role may ha
ITT Tech Flint - CSNETWORKI - NT1210
Project Name: SMPR EXPANSIONDocument Number / Version Number: CASE-7Customer Name: Mr. SheehanCommunications Management Strategy1. PurposeMr. Sheehan there is several different WAN connectivity options to choose from in order toconnect the five bran
ITT Tech Flint - CSNETWORKI - NT1210
&lt;NAME&gt;NT1210SaturdayCase Study 7: Karla SituationAs far as Karla is concerned I would schedule a meeting with Mr. Sheehan, thePresident, and let him know how much of an asset Karla has become. I would voice myconcerns about if one of the new employe
ITT Tech Flint - PHYSICALNE - NT1310
CLOUD COMPUTING RESEARCHRunning head: CLOUD COMPUTING RESEARCHCloud Computing Research&lt;NAME&gt;ITT Technical InstitutePhysical NetworkingNT131007/05/2012Instructor: &lt;NAME&gt;1CLOUD COMPUTING RESEARCH2Cloud Computing ResearchThis paper is going to t
ITT Tech Flint - PHYSICALNE - NT1310
COMPARE AND CONTRASTRunning head: COMPARE AND CONTRAST DIFFERENT SERVICE PROVIDERSCompare and Contrast Different Service Providers&lt;NAME&gt;ITT Technical InstitutePhysical NetworkingNT131006/30/2012Instructor: &lt;NAME&gt;1COMPARE AND CONTRAST2Compare a
ITT Tech Flint - PHYSICALNE - NT1310
&lt;NAME&gt;NT1310Physical NetworkingSaturdayDefinitionsHorizontal Cable: Means the portions of the telecommunications cabling system that extends[extend] from the work area telecommunications outlet or connector to the telecommunicationscloset. The hori
ITT Tech Flint - PHYSICALNE - NT1310
NETWORK TOPOLOGIESRunning head: NETWORK TOPOLOGIESNetwork Topologies&lt;NAME&gt;ITT Technical InstitutePhysical NetworkingNT131007/13/2012Instructor: &lt;NAME&gt;1NETWORK TOPOLOGIES2Network TopologiesThere are several types of Network Topologies that one
ITT Tech Flint - PHYSICALNE - NT1310
Local Exchange-GameRunning head: Local Exchange-Game Transport PathLocal Exchange-Game Transport Path&lt;NAME&gt;ITT Technical InstitutePhysical NetworkingNT131006/27/2012Instructor: &lt;NAME&gt;1Local Exchange-Game2Local Exchange-Game Transport PathOnli
ITT Tech Flint - PHYSICALNE - NT1310
Voice vs. DataRunning head: VOICE VS. DATAVoice vs. Data-Telecom Services&lt;NAME&gt;ITT Technical InstitutePhysical NetworkingNT131006/23/2012Instructor: &lt;NAME&gt;1Voice vs. Data2Voice vs. Data-Telecom ServicesThis paper is to help educate you on the
ITT Tech Flint - CSNETWORKI - NT1330
Business CaseTo:Mr.SheehanA Backbone Network is a computer network infrastructure that is capable ofconnecting different LANs or subnetworks. A backbone network can link together networksin the same building, different buildings over a campus environm
ITT Tech Flint - CSNETWORKI - NT1330
&lt;NAME&gt;NT1330WednesdayUnit 2 Assignment 1: DHCP Troubleshooting05:27Dear Junior Admin:Like anything when you are working with the management of a Client-ServerNetwork it is very temperamental if you dont have it configured right. Double checkthat y
ITT Tech Flint - CSNETWORKI - NT1330
NUMBER OF USERS/DOMAIN+MIN NUMBER OFDOMAIN CONTROLLERS REQUIREDUser per domain in a site14995009991,0002,9993,00010,000Minimum number of domain controllersrequired per domain in a siteOne Single ProcessorOne Dual Processors/CoresTwo Dual Proces
ITT Tech Flint - CSNETWORKI - NT1330
Active Directory DesignRunning head: ACTIVE DIRECTORY DESIGN SCENARIOActive Directory Design Scenario&lt;NAME&gt;ITT Technical InstituteNT1330Client-Server Networking07/15/2012Instructor: Mr. Thomas1Active Directory DesignActive Directory Design Scen
ITT Tech Flint - CSNETWORKI - NT1330
Company Merger ScenarioRunning head: COMPANY MERGER SCENARIOCompany Merger Scenario&lt;NAME&gt;ITT Technical InstituteNT1330Client-Server Networking07/16/2012Instructor: Mr. Thomas1Company Merger ScenarioCompany Merger ScenarioWhen two companies dec
ITT Tech Flint - CSNETWORKI - NT1330
AD Design ReplicationRunning head: AD DESIGN REPLICATION SCENARIOAD Design Replication Scenario&lt;NAME&gt;ITT Technical InstituteNT1330Client-Server Networking07/23/2012Instructor: Mr. Thomas1AD Design Replication2AD Design Replication ScenarioTo
ITT Tech Flint - CSNETWORKI - NT1330
Site-to-SiteRunning head: SITE-TO-SITE CONNECTIVITY SCENARIOSite-to-Site Connectivity Scenario&lt;NAME&gt;ITT Technical InstituteNT1330Client-Server Networking07/24/2012Instructor: Mr. Thomas1Site-to-Site2Site-to-Site Connectivity ScenarioTo Junior
ITT Tech Flint - CSNETWORKI - NT1330
AD User/GroupRunning head: AD USER/GROUP ACCOUNT CREATIONUnit 6, Exercise 1AD User/Group Account Creation&lt;NAME&gt;ITT Technical InstituteNT1330Client-Server Networking II08/10/2012Instructor: Mr. Thomas1AD User/Group2AD User/Group Account Creati
ITT Tech Flint - PROGRAMMIN - PT1420
&lt;NAME&gt;PT142010 October 2012Assignment 1Week 3 HomeworkShort Answer5. The two things that are normally specified in variable declaration are; the variables name andthe variables data type.6. Some languages assign a 0 as the default value to uniniti
ITT Tech Flint - PROGRAMMIN - PT1420
&lt;NAME&gt;PT142030 September 2012Assignment 2 HomeworkShort Answer Questions 1-41. The professional programmer usually works directly with the customer to gainunderstanding of a problem.2. Pseudocode is a fake code that programmers use to create models
ITT Tech Flint - PROGRAMMIN - PT1420
Assignment 1Week 4 Homework&lt;NAME&gt;PT142015 October 2012Short Answer1. Modules help reuse code by writing code in a module once to perform a specificoperation, and then it can be executed any time it is needed.2. In most languages modules have a hea
ITT Tech Flint - PROGRAMMIN - PT1420
Example of For Loop(Count Controlled Loop)Module Main ( )Declare variablesDim toPower as Integer = 2Dim number as Integer = 2For counter As Integer = 0 to 6ToPower = number^2Console.WriteLine (2 of the power of &amp; number &amp; is &amp; toPower)number = num
ITT Tech Flint - PROGRAMMIN - PT1420
&lt;NAME&gt;EN132015 October 2012Research Assignment 1Week 4Advantages and DisadvantagesBelow I have constructed a table to illustrate the advantages and disadvantages of usingglobal variables. There is one advantage that is also a disadvantage and that
ITT Tech Flint - PROGRAMMIN - PT1420
&lt;NAME&gt;PT142001 October 2012Research Assignment 2:Researching Variable Naming RulesThe variable naming rules for Visual Basic are as follows: You must use a letter as the first character. You cant use a space, period (.), exclamation mark (!), or th
ITT Tech Flint - PROGRAMMIN - PT1420
Unit 1 AssignmentRunning head: UNIT 1 ASSIGNMENT 1: HOMEWORKUnit 1 Assignment 1: Homework&lt;NAME&gt;ITT Technical InstitutePT1420Intro to Programming09/23/2012Instructor: Ms. Lloyd1Unit 1 Assignment2Unit 1 Assignment 1: HomeworkThere are many prog
ITT Tech Flint - PROGRAMMIN - PT1420
&lt;NAME&gt;PT142024 September 2012Unit 1 Assignment 1: HomeworkShort-Answer Review Questions 1-71. We say that because without it, the computer could not run software.2. The number 1 represents a bit that is turned on. The number 0 represents a bit that
ITT Tech Flint - PROGRAMMIN - PT1420
&lt;NAME&gt;PT142015 October 2012Week 3 LabsLab 3.1 PseudocodeStep 1Variable NameDeclare Real creditsTakenProblem(Yes or No)NoDeclare Int creditsLeftYesDeclare Real studentNameYesConstant Real creditsNeeded = 90YesIf Yes, whats wrong?Should be
ITT Tech Flint - PROGRAMMIN - PT1420
&lt;NAME&gt;PT142015 October 2012Week 3 Research Assignment 1:Exploring Reverse EngineeringReverse engineering is the process of extracting the knowledge or design blueprintsfrom anything man-made. Reverse engineering is usually conducted to obtain missin
ITT Tech Flint - PROGRAMMIN - PT1420
&lt;NAME&gt;PT142010 October 2012Week 4 LabsLab 4.1 Pseudocode and ModulesModule main ( )/Declare local variables1. Declare String clientName2. Declare Real feetUTP3. Declare Real subtotal4. Declare Real taxCost5. Declare Real totalCost/Module calls
ITT Tech Flint - PROGRAMMIN - PT1420
&lt;NAME&gt;PT142019 October 2012Week 5Assignment 1: HomeworkShort Answer1. The term conditionally executed means that an action is performed only when a certaincondition is true.2. You will use what is called a single alternative decision structure, be
ITT Tech Flint - PROGRAMMIN - PT1420
&lt;NAME&gt;PT142022 October 2012Week 5 LabsLab 5.1 Evaluating Conditions with Relational OperatorsSTEP 2:The conditionTrue or FalseattAverage &gt; = verizonAverageTruetmobileAverage = = 868TrueverizonAverage &lt; sprintAverageFalsesprintAverage ! = att
ITT Tech Flint - PROGRAMMIN - PT1420
&lt;NAME&gt;PT142023 October 2012Week 5 Research Assignment 1:Exploring Why and When to Use Shell Scripts1. Shell script is a text file that contains a sequence of commands for a UNIX basedOperating System, it can also be done in a DOS system but it is ca
ITT Tech Flint - PROGRAMMIN - PT1420
&lt;NAME&gt;PT142028 October 2012Week 6 Assignment 1:HomeworkAlgorithm Workbench Questions 6 106. Rewrite If-Then-Else If statement as Select Case Statement.Module Module1Sub Main()Dim selection As Integer = 0Console.Write(&quot;Please enter a number you w
ITT Tech Flint - PROGRAMMIN - PT1420
&lt;NAME&gt;PT142028 October 2012Week 6 LabsLab 6.1: PseudocodeMain Module( )/Declare variablesDeclare Integer mobileProvider = = 0Declare Integer dataOption = = 0Declare Boolean dataPackage = = True/Make Module calls and pass necessary variablesCall
ITT Tech Flint - PROGRAMMIN - PT1420
&lt;NAME&gt;PT142029 October 2012Week 6 Research Assignment 1:Advantages/Disadvantages ofUsing Case StructuresWhat I found to be the advantages and disadvantages of using case structures to programmultiple alternative decisions are listed below in a tabl
ITT Tech Flint - PROGRAMMIN - PT1420
&lt;NAME&gt;PT142002 November 2012Week 7 Assignment 1: HomeworkShort Answer 1 51. By indenting the statements in the body of the loop you visually set them apart from thesurrounding code, and it makes your program easier to read and debug.2. The differen
ITT Tech Flint - PROGRAMMIN - PT1420
&lt;NAME&gt;PT142004 November 2012Week 7 Research Assignment 1:Exploring How to Stop or Exit an Infinite LoopThe techniques or structures used to exit an infinite loop are an Exit Statement written in thestructure, the following are some examples of a few
ITT Tech Flint - PROGRAMMIN - PT1420
&lt;NAME&gt;PT142009 November 2012Week 8 Assignment 1: HomeworkShort Answer Questions 6 106. An Infinite Loop is a loop that has no way of stopping, it occurs when a programmerforgets to write code inside the loop that makes the test condition false. An e
ITT Tech Flint - PROGRAMMIN - PT1420
&lt;NAME&gt;PT142011 November 2012Week 8 Research Assignment 1:Exploring the Differences betweenCount-controlled Loops and Condition-controlled LoopsThe three examples that show that count-controlled loops are better than conditioncontrolled loops are as
ITT Tech Flint - PROGRAMMIN - PT1420
&lt;NAME&gt;PT142018 November 2012Week 9 Assignment 1: HomeworkShort Answer Questions p. 2531. The difference between a module and a function is that a function is a module that returnsa value back to the part of the program that called it and modules exi
ITT Tech Flint - PROGRAMMIN - PT1420
&lt;NAME&gt;PT142018 November 2012Week 9 Research Assignment 1:How to Call External Programs or Functionsfrom a Program other than Visual BasicIf you call another program that is written in a different language you must have thecorrect plugins downloaded
ITT Tech Flint - PROGRAMMIN - PT1420
&lt;NAME&gt;PT142025 November 2012Week 10 Assignment 1: HomeworkShort Answer Questions 1 2, 4 51. The three steps that must be taken when a file is used by a program are; Open the file,Process the file, and Close the file.2. A program should close a file
ITT Tech Flint - LINUXNETWO - NT1430
RUNNING HEAD: LINUX SECURITY VS. WINDOWS SECURITYLinux Security vs. Windows Security: Who wins out?NT1430 Linux NetworkingWeek 9 Research Rough Draft&lt;NAME&gt;ITT Technical Institute20 November 20121LINUX SECURITY VS. WINDOWS SECURITYThesis Statement
ITT Tech Tucson - COMP - EN1320
Christine Crocker7/10/12EN1320A Moment of TriumphIve had many triumphs in my life, but I want to tell you about my most recentsuccess. Most of my life Ive had jobs but was never really sure what career path Iwanted to journey down. Ive looked into m
Jackson State - MNGT - 330
Question 15 out of 5 pointsKohlberg's three phases of moral development in order are law and order, instrumentalexchange, and universal principle.AnswerSelected Answer:FalseCorrect Answer:False Question 25 out of 5 pointsThe four types of work
Jackson State - MNGT - 330
Question 15 out of 5 pointsExternal environments are the forces and events outside a company that have the potential toinfluence or affect it.AnswerSelected Answer:TrueCorrect Answer:True Question 25 out of 5 pointsAccording to its rate of env
Jackson State - MNGT - 330
Question 15 out of 5 pointsThe job of team leader would NOT be considered a management position.AnswerSelected Answer:FalseCorrect Answer:False Question 25 out of 5 pointsManagers are responsible for doing the basic work in the company.Answer
Jackson State - MNGT - 330
Question 15 out of 5 pointsA Gantt chart can be used to track informal communication paths.AnswerSelected Answer:FalseCorrect Answer:False Question 25 out of 5 pointsThe point of integrative conflict resolution is to have both parties indicate
Jackson State - ACCT - 314
Assignment Print Viewhttp:/ezto.mhecloud.mcgraw-hill.com/hm_accounting.tpx?todo.Score: 14.871.out of 40 points (37.18%)award:2.15 out of10.00pointsListed below are several transactions that took place during the first two years of operations for
Jackson State - ACCT - 314
Assignment Print Viewhttp:/ezto.mhecloud.mcgraw-hill.com/hm_accounting.tpx?todo.Score: 501.out of 50 points (100%)award:10 out of10.00pointsOn March 1, 2011, Beldon Corporation purchased land as a factory site for $60,000. An old building onthe
Jackson State - ACCT - 314
Assignment Print Viewhttp:/ezto.mhecloud.mcgraw-hill.com/hm_accounting.tpx?todo.Score: 38.851.out of 40 points (97.13%)award:10 out of10.00pointsYou did NOT receive full credit for this question in previous attempt.The following are the typical
Jackson State - HISTORY - 101
Question 10 out of 1 pointsSymbols and innovations associated with revolutionary France included all but which of thefollowing?AnswerSelected Answer:b.new street namesCorrect Answer:d.lots of new statues honoring the king's royal family members