SlideShare a Scribd company logo
1 of 2
Assignment 3: Secure Encrypted Communications
Due Week 9 and worth 80 points
Transmitting personal and business data and information over
secure communication channels is critical. In some cases it is
required, especially when personally identifiable information is
being transmitted. Credit card numbers, Social Security
Numbers, online purchases, business orders, and so on must all
be transmitted over secure communication channels. The Public
Key Infrastructure (PKI) provides the most widely used secure
communications technology. PKI relies on encryption.
Write a four to five (4-5) page paper in which you:
Compare and contrast symmetric encryption to asymmetric
encryption.
PKI uses digital certificates to encrypt / decrypt data. Analyze
the process of encrypting and decrypting data using a digital
certificate.
Evaluate the advantages and disadvantages of using digital
certificates.
Evaluate the challenges related to public and private key
management when using PKI.
Use at least three (3) quality resources in this assignment.
Note:
Wikipedia and similar Websites do not qualify as quality
resources.
Your assignment must follow these formatting requirements:
Be typed, double spaced, using Times New Roman font (size
12), with one-inch margins on all sides; citations and references
must follow APA or school-specific format. Check with your
professor for any additional instructions.
Include a cover page containing the title of the assignment, the
student’s name, the professor’s name, the course title, and the
date. The cover page and the reference page are not included in
the required assignment page length.
The specific course learning outcomes associated with this
assignment are:
Implement PKI and encryption solutions to ensure the
confidentiality of business communications.
Use technology and information resources to research issues in
access control.
Write clearly and concisely about topics related to Security
Access & Control Strategies using proper writing mechanics and
technical style conventions.

More Related Content

Similar to Assignment 3 Secure Encrypted CommunicationsDue Week 9 and worth .docx

SecureWeb3 - Developing a Comprehensive Cybersecurity Strategy for the Decent...
SecureWeb3 - Developing a Comprehensive Cybersecurity Strategy for the Decent...SecureWeb3 - Developing a Comprehensive Cybersecurity Strategy for the Decent...
SecureWeb3 - Developing a Comprehensive Cybersecurity Strategy for the Decent...Prasanna Hegde
 
Reconsidering Public Key Infrastructure and its Place in Your Enterprise Stra...
Reconsidering Public Key Infrastructure and its Place in Your Enterprise Stra...Reconsidering Public Key Infrastructure and its Place in Your Enterprise Stra...
Reconsidering Public Key Infrastructure and its Place in Your Enterprise Stra...Omlis
 
Strayer cis 333 week 6 case study 2
Strayer cis 333 week 6 case study 2Strayer cis 333 week 6 case study 2
Strayer cis 333 week 6 case study 2nikig6806
 
Strayer cis 333 week 6 case study 2
Strayer cis 333 week 6 case study 2Strayer cis 333 week 6 case study 2
Strayer cis 333 week 6 case study 2vikscarter
 
Website Security Certification The Key to Keeping Your Website Safe
Website Security Certification The Key to Keeping Your Website SafeWebsite Security Certification The Key to Keeping Your Website Safe
Website Security Certification The Key to Keeping Your Website SafePixlogix Infotech
 
PACE-IT, Security+ 6.3: Introduction to Public Key Infrastructure (part 1)
PACE-IT, Security+ 6.3: Introduction to Public Key Infrastructure (part 1)PACE-IT, Security+ 6.3: Introduction to Public Key Infrastructure (part 1)
PACE-IT, Security+ 6.3: Introduction to Public Key Infrastructure (part 1)Pace IT at Edmonds Community College
 
IRJET- Exchanging Secure Data in Cloud with Confidentiality and Privacy Goals
IRJET- Exchanging Secure Data in Cloud with Confidentiality and Privacy GoalsIRJET- Exchanging Secure Data in Cloud with Confidentiality and Privacy Goals
IRJET- Exchanging Secure Data in Cloud with Confidentiality and Privacy GoalsIRJET Journal
 
Three Step Multifactor Authentication Systems for Modern Security
Three Step Multifactor Authentication Systems for Modern SecurityThree Step Multifactor Authentication Systems for Modern Security
Three Step Multifactor Authentication Systems for Modern Securityijtsrd
 
Strong authentication implementation guide
Strong authentication   implementation guideStrong authentication   implementation guide
Strong authentication implementation guideNis
 
E Commerce
E CommerceE Commerce
E Commercejroloff
 
"Is your browser secure? Breaking cryptography in PKI based systems, opening ...
"Is your browser secure? Breaking cryptography in PKI based systems, opening ..."Is your browser secure? Breaking cryptography in PKI based systems, opening ...
"Is your browser secure? Breaking cryptography in PKI based systems, opening ...PROIDEA
 
Laudon traver ec11-im_ch05
Laudon traver ec11-im_ch05Laudon traver ec11-im_ch05
Laudon traver ec11-im_ch05BookStoreLib
 
Development of Digital Identity Systems
Development of Digital Identity Systems Development of Digital Identity Systems
Development of Digital Identity Systems Maganathin Veeraragaloo
 
#MFSummit2016 Secure: Mind the gap strengthening the information security model
#MFSummit2016 Secure: Mind the gap strengthening the information security model#MFSummit2016 Secure: Mind the gap strengthening the information security model
#MFSummit2016 Secure: Mind the gap strengthening the information security modelMicro Focus
 
Cis 333 Success Begins / snaptutorial.com
Cis 333 Success Begins / snaptutorial.comCis 333 Success Begins / snaptutorial.com
Cis 333 Success Begins / snaptutorial.comRobinson069
 
Cis 333 Enthusiastic Study / snaptutorial.com
Cis 333 Enthusiastic Study / snaptutorial.comCis 333 Enthusiastic Study / snaptutorial.com
Cis 333 Enthusiastic Study / snaptutorial.comGeorgeDixon99
 
Network Security
Network SecurityNetwork Security
Network SecurityBeth Hall
 
The 2016 Guide to IT Identity Management
The 2016 Guide to IT Identity ManagementThe 2016 Guide to IT Identity Management
The 2016 Guide to IT Identity ManagementJumpCloud
 
6 ways reduce pci dss audit scope tokenizing cardholder data
6 ways reduce pci dss audit scope tokenizing cardholder data6 ways reduce pci dss audit scope tokenizing cardholder data
6 ways reduce pci dss audit scope tokenizing cardholder dataRichard Thompson
 

Similar to Assignment 3 Secure Encrypted CommunicationsDue Week 9 and worth .docx (20)

SecureWeb3 - Developing a Comprehensive Cybersecurity Strategy for the Decent...
SecureWeb3 - Developing a Comprehensive Cybersecurity Strategy for the Decent...SecureWeb3 - Developing a Comprehensive Cybersecurity Strategy for the Decent...
SecureWeb3 - Developing a Comprehensive Cybersecurity Strategy for the Decent...
 
Reconsidering Public Key Infrastructure and its Place in Your Enterprise Stra...
Reconsidering Public Key Infrastructure and its Place in Your Enterprise Stra...Reconsidering Public Key Infrastructure and its Place in Your Enterprise Stra...
Reconsidering Public Key Infrastructure and its Place in Your Enterprise Stra...
 
Strayer cis 333 week 6 case study 2
Strayer cis 333 week 6 case study 2Strayer cis 333 week 6 case study 2
Strayer cis 333 week 6 case study 2
 
Strayer cis 333 week 6 case study 2
Strayer cis 333 week 6 case study 2Strayer cis 333 week 6 case study 2
Strayer cis 333 week 6 case study 2
 
Website Security Certification The Key to Keeping Your Website Safe
Website Security Certification The Key to Keeping Your Website SafeWebsite Security Certification The Key to Keeping Your Website Safe
Website Security Certification The Key to Keeping Your Website Safe
 
PACE-IT, Security+ 6.3: Introduction to Public Key Infrastructure (part 1)
PACE-IT, Security+ 6.3: Introduction to Public Key Infrastructure (part 1)PACE-IT, Security+ 6.3: Introduction to Public Key Infrastructure (part 1)
PACE-IT, Security+ 6.3: Introduction to Public Key Infrastructure (part 1)
 
IRJET- Exchanging Secure Data in Cloud with Confidentiality and Privacy Goals
IRJET- Exchanging Secure Data in Cloud with Confidentiality and Privacy GoalsIRJET- Exchanging Secure Data in Cloud with Confidentiality and Privacy Goals
IRJET- Exchanging Secure Data in Cloud with Confidentiality and Privacy Goals
 
Three Step Multifactor Authentication Systems for Modern Security
Three Step Multifactor Authentication Systems for Modern SecurityThree Step Multifactor Authentication Systems for Modern Security
Three Step Multifactor Authentication Systems for Modern Security
 
Strong authentication implementation guide
Strong authentication   implementation guideStrong authentication   implementation guide
Strong authentication implementation guide
 
E Commerce
E CommerceE Commerce
E Commerce
 
"Is your browser secure? Breaking cryptography in PKI based systems, opening ...
"Is your browser secure? Breaking cryptography in PKI based systems, opening ..."Is your browser secure? Breaking cryptography in PKI based systems, opening ...
"Is your browser secure? Breaking cryptography in PKI based systems, opening ...
 
Laudon traver ec11-im_ch05
Laudon traver ec11-im_ch05Laudon traver ec11-im_ch05
Laudon traver ec11-im_ch05
 
Development of Digital Identity Systems
Development of Digital Identity Systems Development of Digital Identity Systems
Development of Digital Identity Systems
 
#MFSummit2016 Secure: Mind the gap strengthening the information security model
#MFSummit2016 Secure: Mind the gap strengthening the information security model#MFSummit2016 Secure: Mind the gap strengthening the information security model
#MFSummit2016 Secure: Mind the gap strengthening the information security model
 
Cis 333 Success Begins / snaptutorial.com
Cis 333 Success Begins / snaptutorial.comCis 333 Success Begins / snaptutorial.com
Cis 333 Success Begins / snaptutorial.com
 
Cis 333 Enthusiastic Study / snaptutorial.com
Cis 333 Enthusiastic Study / snaptutorial.comCis 333 Enthusiastic Study / snaptutorial.com
Cis 333 Enthusiastic Study / snaptutorial.com
 
Network Security
Network SecurityNetwork Security
Network Security
 
Cybersecurity Slides
Cybersecurity  SlidesCybersecurity  Slides
Cybersecurity Slides
 
The 2016 Guide to IT Identity Management
The 2016 Guide to IT Identity ManagementThe 2016 Guide to IT Identity Management
The 2016 Guide to IT Identity Management
 
6 ways reduce pci dss audit scope tokenizing cardholder data
6 ways reduce pci dss audit scope tokenizing cardholder data6 ways reduce pci dss audit scope tokenizing cardholder data
6 ways reduce pci dss audit scope tokenizing cardholder data
 

More from MatthewTennant613

Assignment Application Adoption of New Technology SystemsAs a nu.docx
Assignment Application Adoption of New Technology SystemsAs a nu.docxAssignment Application Adoption of New Technology SystemsAs a nu.docx
Assignment Application Adoption of New Technology SystemsAs a nu.docxMatthewTennant613
 
Assignment Accreditation and Quality EnhancementThe purpose of ac.docx
Assignment Accreditation and Quality EnhancementThe purpose of ac.docxAssignment Accreditation and Quality EnhancementThe purpose of ac.docx
Assignment Accreditation and Quality EnhancementThe purpose of ac.docxMatthewTennant613
 
ASSIGNMENT AOperationsManagement- Y.docx
ASSIGNMENT AOperationsManagement- Y.docxASSIGNMENT AOperationsManagement- Y.docx
ASSIGNMENT AOperationsManagement- Y.docxMatthewTennant613
 
Assignment Adaptive ResponseAs an advanced practice nurse, you wi.docx
Assignment Adaptive ResponseAs an advanced practice nurse, you wi.docxAssignment Adaptive ResponseAs an advanced practice nurse, you wi.docx
Assignment Adaptive ResponseAs an advanced practice nurse, you wi.docxMatthewTennant613
 
Assignment 5 Senior Seminar Project Due Week 10 and worth 200 poi.docx
Assignment 5 Senior Seminar Project Due Week 10 and worth 200 poi.docxAssignment 5 Senior Seminar Project Due Week 10 and worth 200 poi.docx
Assignment 5 Senior Seminar Project Due Week 10 and worth 200 poi.docxMatthewTennant613
 
Assignment 5 Federal Contracting Activities and Contract Types Du.docx
Assignment 5 Federal Contracting Activities and Contract Types Du.docxAssignment 5 Federal Contracting Activities and Contract Types Du.docx
Assignment 5 Federal Contracting Activities and Contract Types Du.docxMatthewTennant613
 
Assignment 5 CrowdsourcingDue 06102017 At 1159 PMCrowdso.docx
Assignment 5 CrowdsourcingDue 06102017 At 1159 PMCrowdso.docxAssignment 5 CrowdsourcingDue 06102017 At 1159 PMCrowdso.docx
Assignment 5 CrowdsourcingDue 06102017 At 1159 PMCrowdso.docxMatthewTennant613
 
Assignment 4What are the power motivators of police leaders Expla.docx
Assignment 4What are the power motivators of police leaders Expla.docxAssignment 4What are the power motivators of police leaders Expla.docx
Assignment 4What are the power motivators of police leaders Expla.docxMatthewTennant613
 
Assignment 4Project ProgressDue Week 9 and worth 200 points.docx
Assignment 4Project ProgressDue Week 9 and worth 200 points.docxAssignment 4Project ProgressDue Week 9 and worth 200 points.docx
Assignment 4Project ProgressDue Week 9 and worth 200 points.docxMatthewTennant613
 
Assignment 4 PresentationChoose any federal statute that is curre.docx
Assignment 4 PresentationChoose any federal statute that is curre.docxAssignment 4 PresentationChoose any federal statute that is curre.docx
Assignment 4 PresentationChoose any federal statute that is curre.docxMatthewTennant613
 
Assignment 4 The Perfect ManagerWrite a one to two (1–2) page pap.docx
Assignment 4 The Perfect ManagerWrite a one to two (1–2) page pap.docxAssignment 4 The Perfect ManagerWrite a one to two (1–2) page pap.docx
Assignment 4 The Perfect ManagerWrite a one to two (1–2) page pap.docxMatthewTennant613
 
Assignment 4 Presentation Choose any federal statute that is cu.docx
Assignment 4 Presentation Choose any federal statute that is cu.docxAssignment 4 Presentation Choose any federal statute that is cu.docx
Assignment 4 Presentation Choose any federal statute that is cu.docxMatthewTennant613
 
Assignment 4 Inmates Rights and Special CircumstancesDue Week 8 a.docx
Assignment 4 Inmates Rights and Special CircumstancesDue Week 8 a.docxAssignment 4 Inmates Rights and Special CircumstancesDue Week 8 a.docx
Assignment 4 Inmates Rights and Special CircumstancesDue Week 8 a.docxMatthewTennant613
 
Assignment 4 Part D Your Marketing Plan – Video Presentation.docx
Assignment 4 Part D Your Marketing Plan – Video Presentation.docxAssignment 4 Part D Your Marketing Plan – Video Presentation.docx
Assignment 4 Part D Your Marketing Plan – Video Presentation.docxMatthewTennant613
 
Assignment 4 DUE Friday 72117 @ 1100amTurn in a written respon.docx
Assignment 4 DUE Friday 72117 @ 1100amTurn in a written respon.docxAssignment 4 DUE Friday 72117 @ 1100amTurn in a written respon.docx
Assignment 4 DUE Friday 72117 @ 1100amTurn in a written respon.docxMatthewTennant613
 
Assignment 4 Database Modeling and NormalizationImagine that yo.docx
Assignment 4 Database Modeling and NormalizationImagine that yo.docxAssignment 4 Database Modeling and NormalizationImagine that yo.docx
Assignment 4 Database Modeling and NormalizationImagine that yo.docxMatthewTennant613
 
Assignment 3 Inductive and Deductive ArgumentsIn this assignment,.docx
Assignment 3 Inductive and Deductive ArgumentsIn this assignment,.docxAssignment 3 Inductive and Deductive ArgumentsIn this assignment,.docx
Assignment 3 Inductive and Deductive ArgumentsIn this assignment,.docxMatthewTennant613
 
Assignment 3 Wireless WorldWith the fast-moving technology, the w.docx
Assignment 3 Wireless WorldWith the fast-moving technology, the w.docxAssignment 3 Wireless WorldWith the fast-moving technology, the w.docx
Assignment 3 Wireless WorldWith the fast-moving technology, the w.docxMatthewTennant613
 
Assignment 3 Web Design Usability Guide PresentationBefore you .docx
Assignment 3 Web Design Usability Guide PresentationBefore you .docxAssignment 3 Web Design Usability Guide PresentationBefore you .docx
Assignment 3 Web Design Usability Guide PresentationBefore you .docxMatthewTennant613
 
Assignment 3 Understanding the Prevalence of Community PolicingAs.docx
Assignment 3 Understanding the Prevalence of Community PolicingAs.docxAssignment 3 Understanding the Prevalence of Community PolicingAs.docx
Assignment 3 Understanding the Prevalence of Community PolicingAs.docxMatthewTennant613
 

More from MatthewTennant613 (20)

Assignment Application Adoption of New Technology SystemsAs a nu.docx
Assignment Application Adoption of New Technology SystemsAs a nu.docxAssignment Application Adoption of New Technology SystemsAs a nu.docx
Assignment Application Adoption of New Technology SystemsAs a nu.docx
 
Assignment Accreditation and Quality EnhancementThe purpose of ac.docx
Assignment Accreditation and Quality EnhancementThe purpose of ac.docxAssignment Accreditation and Quality EnhancementThe purpose of ac.docx
Assignment Accreditation and Quality EnhancementThe purpose of ac.docx
 
ASSIGNMENT AOperationsManagement- Y.docx
ASSIGNMENT AOperationsManagement- Y.docxASSIGNMENT AOperationsManagement- Y.docx
ASSIGNMENT AOperationsManagement- Y.docx
 
Assignment Adaptive ResponseAs an advanced practice nurse, you wi.docx
Assignment Adaptive ResponseAs an advanced practice nurse, you wi.docxAssignment Adaptive ResponseAs an advanced practice nurse, you wi.docx
Assignment Adaptive ResponseAs an advanced practice nurse, you wi.docx
 
Assignment 5 Senior Seminar Project Due Week 10 and worth 200 poi.docx
Assignment 5 Senior Seminar Project Due Week 10 and worth 200 poi.docxAssignment 5 Senior Seminar Project Due Week 10 and worth 200 poi.docx
Assignment 5 Senior Seminar Project Due Week 10 and worth 200 poi.docx
 
Assignment 5 Federal Contracting Activities and Contract Types Du.docx
Assignment 5 Federal Contracting Activities and Contract Types Du.docxAssignment 5 Federal Contracting Activities and Contract Types Du.docx
Assignment 5 Federal Contracting Activities and Contract Types Du.docx
 
Assignment 5 CrowdsourcingDue 06102017 At 1159 PMCrowdso.docx
Assignment 5 CrowdsourcingDue 06102017 At 1159 PMCrowdso.docxAssignment 5 CrowdsourcingDue 06102017 At 1159 PMCrowdso.docx
Assignment 5 CrowdsourcingDue 06102017 At 1159 PMCrowdso.docx
 
Assignment 4What are the power motivators of police leaders Expla.docx
Assignment 4What are the power motivators of police leaders Expla.docxAssignment 4What are the power motivators of police leaders Expla.docx
Assignment 4What are the power motivators of police leaders Expla.docx
 
Assignment 4Project ProgressDue Week 9 and worth 200 points.docx
Assignment 4Project ProgressDue Week 9 and worth 200 points.docxAssignment 4Project ProgressDue Week 9 and worth 200 points.docx
Assignment 4Project ProgressDue Week 9 and worth 200 points.docx
 
Assignment 4 PresentationChoose any federal statute that is curre.docx
Assignment 4 PresentationChoose any federal statute that is curre.docxAssignment 4 PresentationChoose any federal statute that is curre.docx
Assignment 4 PresentationChoose any federal statute that is curre.docx
 
Assignment 4 The Perfect ManagerWrite a one to two (1–2) page pap.docx
Assignment 4 The Perfect ManagerWrite a one to two (1–2) page pap.docxAssignment 4 The Perfect ManagerWrite a one to two (1–2) page pap.docx
Assignment 4 The Perfect ManagerWrite a one to two (1–2) page pap.docx
 
Assignment 4 Presentation Choose any federal statute that is cu.docx
Assignment 4 Presentation Choose any federal statute that is cu.docxAssignment 4 Presentation Choose any federal statute that is cu.docx
Assignment 4 Presentation Choose any federal statute that is cu.docx
 
Assignment 4 Inmates Rights and Special CircumstancesDue Week 8 a.docx
Assignment 4 Inmates Rights and Special CircumstancesDue Week 8 a.docxAssignment 4 Inmates Rights and Special CircumstancesDue Week 8 a.docx
Assignment 4 Inmates Rights and Special CircumstancesDue Week 8 a.docx
 
Assignment 4 Part D Your Marketing Plan – Video Presentation.docx
Assignment 4 Part D Your Marketing Plan – Video Presentation.docxAssignment 4 Part D Your Marketing Plan – Video Presentation.docx
Assignment 4 Part D Your Marketing Plan – Video Presentation.docx
 
Assignment 4 DUE Friday 72117 @ 1100amTurn in a written respon.docx
Assignment 4 DUE Friday 72117 @ 1100amTurn in a written respon.docxAssignment 4 DUE Friday 72117 @ 1100amTurn in a written respon.docx
Assignment 4 DUE Friday 72117 @ 1100amTurn in a written respon.docx
 
Assignment 4 Database Modeling and NormalizationImagine that yo.docx
Assignment 4 Database Modeling and NormalizationImagine that yo.docxAssignment 4 Database Modeling and NormalizationImagine that yo.docx
Assignment 4 Database Modeling and NormalizationImagine that yo.docx
 
Assignment 3 Inductive and Deductive ArgumentsIn this assignment,.docx
Assignment 3 Inductive and Deductive ArgumentsIn this assignment,.docxAssignment 3 Inductive and Deductive ArgumentsIn this assignment,.docx
Assignment 3 Inductive and Deductive ArgumentsIn this assignment,.docx
 
Assignment 3 Wireless WorldWith the fast-moving technology, the w.docx
Assignment 3 Wireless WorldWith the fast-moving technology, the w.docxAssignment 3 Wireless WorldWith the fast-moving technology, the w.docx
Assignment 3 Wireless WorldWith the fast-moving technology, the w.docx
 
Assignment 3 Web Design Usability Guide PresentationBefore you .docx
Assignment 3 Web Design Usability Guide PresentationBefore you .docxAssignment 3 Web Design Usability Guide PresentationBefore you .docx
Assignment 3 Web Design Usability Guide PresentationBefore you .docx
 
Assignment 3 Understanding the Prevalence of Community PolicingAs.docx
Assignment 3 Understanding the Prevalence of Community PolicingAs.docxAssignment 3 Understanding the Prevalence of Community PolicingAs.docx
Assignment 3 Understanding the Prevalence of Community PolicingAs.docx
 

Recently uploaded

“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...Marc Dusseiller Dusjagr
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAssociation for Project Management
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxNirmalaLoungPoorunde1
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityGeoBlogs
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdfSoniaTolstoy
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxheathfieldcps1
 
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991RKavithamani
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionSafetyChain Software
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon AUnboundStockton
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxOH TEIK BIN
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsanshu789521
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...EduSkills OECD
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesFatimaKhan178732
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeThiyagu K
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13Steve Thomason
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfsanyamsingh5019
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxGaneshChakor2
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Sapana Sha
 

Recently uploaded (20)

“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across Sectors
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptx
 
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdfTataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activity
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
Staff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSDStaff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSD
 
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory Inspection
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon A
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptx
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha elections
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and Actinides
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and Mode
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdf
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptx
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
 

Assignment 3 Secure Encrypted CommunicationsDue Week 9 and worth .docx

  • 1. Assignment 3: Secure Encrypted Communications Due Week 9 and worth 80 points Transmitting personal and business data and information over secure communication channels is critical. In some cases it is required, especially when personally identifiable information is being transmitted. Credit card numbers, Social Security Numbers, online purchases, business orders, and so on must all be transmitted over secure communication channels. The Public Key Infrastructure (PKI) provides the most widely used secure communications technology. PKI relies on encryption. Write a four to five (4-5) page paper in which you: Compare and contrast symmetric encryption to asymmetric encryption. PKI uses digital certificates to encrypt / decrypt data. Analyze the process of encrypting and decrypting data using a digital certificate. Evaluate the advantages and disadvantages of using digital certificates. Evaluate the challenges related to public and private key management when using PKI. Use at least three (3) quality resources in this assignment. Note: Wikipedia and similar Websites do not qualify as quality resources. Your assignment must follow these formatting requirements: Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. Check with your professor for any additional instructions. Include a cover page containing the title of the assignment, the student’s name, the professor’s name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length. The specific course learning outcomes associated with this
  • 2. assignment are: Implement PKI and encryption solutions to ensure the confidentiality of business communications. Use technology and information resources to research issues in access control. Write clearly and concisely about topics related to Security Access & Control Strategies using proper writing mechanics and technical style conventions.