SlideShare a Scribd company logo
1 of 10
1. Original Post by Catherine Johnson
Cryptographic Methods:
Cryptography is the science of concealing information or
encrypting information. Computers use complex cryptographic
algorithms to enable data protection, data hiding, integrity
checks, nonrepudiation services, policy enforcement, key
management, and exchange, and many more (Conklin, 2018).
Cryptography is classified into three types symmetric
cryptography, asymmetric cryptography, and hash functions
Symmetric cryptography is also known as secret-key
cryptography. It uses a single key to encrypt and decrypt data
making it the simplest type of cryptography. A plain text with
the key produces the same cipher similarly, the ciphertext with
the key produces the plain text. "Symmetric encryption is useful
for protecting data between parties with an established shared
key and is also frequently used to store confidential data"
(Burnett & Foster, 2004). This type of cryptography is suited
for bulk encryption as it is fast and easy.
Asymmetric cryptography is also known as public-key
cryptography. In this method, two keys are used to encrypt data.
One for encoding and the other for decoding. One of the two
keys stays private while the other is shared. The algorithms are
based on integer factorization and discrete logarithmic
problems. This encryption method is used for authentication and
confidentiality.
The hash function is a special mathematical function. It
performs a one-way function, which means that once the
algorithm is processed, there is no feasible way to use the
ciphertext to retrieve the plaintext that was used to generate it
(Conklin, 2018). Hashes provide confidentiality but not
integrity because even though we cannot determine the original
text, we can ascertain the modified text. These are utilized in
programs, text messages, and operating systems files.
Public Key Infrastructure (PKI):
It is an infrastructure that enables users to communicate
securely. PKI uses the asymmetric method; one private key and
one public key. The public key can only decrypt the file
encrypted by the private key, which affirms the receiver and the
sender's information is secure during a transaction. The
challenges PKI face is the storage and protection of the keys.
The encryption keys can be stolen or unrecoverable based on the
measures taken to store them. Additionally, failure to issue and
renew certificates can cause large-scale connectivity issues.
Physical Security:
Physical security needs to be maintained to prevent attackers
from gaining access to steal data. Physical security is essential
in an organization to prevent unauthorized individuals from
causing harm to the business. If systems and devices are
physically accessed, all files, data, information, and networks
can be compromised. Granting limited access to employees to
computer rooms or server rooms can prevent theft and help with
intentional and unintentional damages. Perimeter security is
also important, especially for sites and server access.
Furthermore, device management is crucial as well because
stolen devices can cause data breaches. Organizations should
implement endpoint security management to access devices
outside the company's network and keep them safe.
References
Conklin, Wm., A. et al. Principles of computer security:
CompTIA security and beyond, fifth edition. Available from:
Slingshot eReader, (5th Edition). McGraw-Hill Professional,
2018.
Burnett. M, Foster. J. C. 2004. Hacking the code ASP.Net web
application
security. https://www.sciencedirect.com/topics/computer-
science/symmetric-cryptography
2. Original Post from Ayesha Syeda
They cannot protect everything against every threat. However,
as we continue to expand our definition of threat, we can
identify more threat types and better evaluate their impact on a
business, including all the factors that go into designing a
technological solution. When we apply technology to create new
ideas, we can call the resulting new product or service a threat
since it is something that increases the cost of doing busi ness or
causes competitors to re-evaluate where they are in the
competitive hierarchy. For a company to be classified as a
threat, it must: Have created, in some form or fashion, a product
or service that has a market share of more than 30% and Have
had a significant technological change that increases the cost of
doing business by more than 20%. The threat must be
significant enough to create a market opportunity for the
company. The danger is that the threat increases the pressure on
the organization to act quickly because, in the meantime, the
company is in a quandary because of the risk that the
information might be used against them by competitors, as one
example, or the information might damage a competitor's
reputation. A solution can be to develop a system that will send
alerts when there is a change in the information. This might
require information systems that allow the users to track
changes in the data. The company should have administrative,
training, and educational staff to maintain control. As a
company expands across national markets, the number of people
in the country that need to be trained to serve the foreign
market should be relatively small. In such cases, it is common
to have multiple people who perform different tasks so that one
specialist may need to be trained in one country and another in
another.
Cryptographic weaknesses might be related to different classes
of weaknesses, including the weaknesses in software design, the
vulnerabilities of hardware, the weaknesses in communicatio n
and security networks, and others. Different cryptosystems can
address two main types of weaknesses. A weakness in software
design can be addressed by a software implementation that
implements a robust design and provides several security
features. For example, the device has a fingerprint scanner that
can identify the person entering and leaving the hotel and stores
the hotel guest's name, phone number, and email address.
Furthermore, the hotel provides a free Wi-Fi password if
someone uses one of the hotel's mobile phones in the hotel
premises without permission. The hotel provides a service to
guests to remotely connect their mobile phones to their Wi -Fi
network. If a guest does not have the required device, they can
connect their mobile phone to this application and use this data
to charge their card. Once charged, the device is sent to the
guest's mobile phone. The mobile phone then connects to the
charging station and allows the guest to use this card to
continue their journey. There is no additional charge when
using a mobile phone as a payment terminal.
The key for PKI is the identification of valid and invalid
transactions within the transactions. We define valid as "anyone
transaction that meets the following conditions": The
transaction inputs are valid. The transaction outputs are valid.
The inputs are included in one of the inputs and are not
modified. The outputs are included in one of the outputs and are
not modified. We use three examples for validation. We
consider a peer-to-peer instant messaging protocol as an
example. The basic idea is the simple one. It allows anyone in
the world to send an encrypted message in real-time. This
means that no one will be able to read anything until the
message is received by a third party and is decrypted. This is
what makes instant messaging worthwhile. However, the
messages contained within them are compassionate and easy to
track. It also means that the sender of the secret message has
access to it forever (Cambou et al., 2019). In addition to this,
the sender also needs to be aware of the recipient's location. If
the recipient is in the same room as him/her, it is more
challenging to get secure communication, and hence it is best to
encrypt this session. For instance, senders can encrypt their
messages only with the cipher AES or RSA, which means they
cannot decrypt them by brute force. If this is the case, the
sender needs to change the recipient's destination or choose a
different cipher and thus create a new session.
An excellent place to start is by examining their organization's
physical control procedures. These controls can be implemented
via the training of key personnel, written policies, rules, or
management processes. The security management team needs to
know how to assess the security of the organization's
information systems to ensure that they are capable of
maintaining and restoring data that is lost or stolen, as well as
the availability of data and information to allow the success of
business operations. This requires an understanding of
technology, security, and digital transformation in the digital
era. At ICAP, the security team is constantly challenged with
deciding what new information technology applications to add
to the existing inventory management system. The most obvious
potential application would be in the handling of customer
information. It is known that the use of an ERP system can
provide more excellent information quality and lower inventory
levels. However, integrating electronic and physical data within
the same data warehouse can make the system more complex.
However, as the number of physical elements in an electronic
database increase, it is easier for IT to integrate data into the
system. IT can also benefit from developing processes for
storing and analyzing structured information. This analysis is
often undertaken using software applications, such as structured
reporting or text mining.
Reference:
Cambou, B., Philabaum, C., Booher, D., & Telesca, D. A.
(2019, March). Response-based cryptographic methods with
ternary physical unclonable functions. In Future of Information
and Communication Conference (pp. 781-800). Springer, Cham.
Homework 1: Challenges to Present-Day Marketers 1 page
answer
Answer each question
1. In your own words, identify three of the greatest challenges
to present-day marketing managers. Do NOT refer to the text,
or any outside reference.
2. Provide a real-world example of each of the challenges you
identified.
3. For EACH of the examples you gave, provide a recommended
solution (or solutions) to overcoming the challenge.
Homework 2 : (1 page answer)
Healthy Happy Homes
After two decades of real estate investing, Healthy Happy
Homes’ owner wanted to combine two personal passions: real
estate and living a quality, healthy life. After creating a Healthy
Home Checklist to review the environmental quality of the
living space (i.e., fabric, floor, cleaning supplies, air quality,
area hazards, etc.), Healthy Happy Homes provides
consultations with renters, current owners, potential buyers/
sellers to analyze and improve the quality of the living
environment to guide purchasing and/or renovation decisions.
In addition to the Healthy Home Checklist, Healthy Happy
Homes has generated a content-based educational series on
social media and speaking events to inform business and
individuals about seeking, developing, and maintaining a
quality living environment.
To complement the mission, Healthy Happy Homes has
compiled a database of businesses and contractors that provided
checklist-approved quality environmental services such as
organic fabric window treatments, clean air floors, organic
cleaning supplies, and quality construction materials.
Mission:
To empower/enable the highest quality of living in the purest
environment
Healthy Happy Homes has a mission statement yet is missing
the goals that will serve in the development of measurable,
achievable objectives for growing its business. Using the
sample mission and goals in the example case a model (example
on next page), and after reviewing the description of Happy
Healthy Homes, write three to five goals with bullet points.
As you are working on your objectives, consider these guiding
questions:
Mission: Big picture vision
· Does mission describe the overall “why” a company exists?
· What unique vision does the Mission Statement describe?
· What core values and principles does the company
represent?
Objectives: Measurable, obtainable outcomes
· How does your company maintain profitability?
· How does your company present customer service?
· What core values define your company’s growth, marketing,
and interaction?
· What aspects of managing change and marketing are
important to your company?
· What expectations do you have for your company and
customer interaction
Sample Mission and Objectives
Realty Business Leaders (RBL)
RBL began in 1996, to provide supportive digital technology
solutions for professionals in the real estate industry. They
serve agents, brokers, and investors in both residential and
commercial applications. They provide online, digital, and print
resources and tools for generating leads, supporting individual
agents and brokers to successfully grow and manage their
businesses. RBL’s cloud -based subscriptions provide total
access to marketing and sales software such as websites,
customer relationship management (CRM), lead generation, goal
tracking, and training materials that support conversion of
prospects into clients.
Mission:
To empower real estate industry professionals in exceeding
property buyers’ and sellers’ expectations through innovative,
accessible technology
Sample Goals:
Goal 1: Provide exceptional, best practice, innovative lead
generation tools
a. Provide exclusive qualified lead generation
b. Generate real-time analytics to provide intuitive activity and
insights
c. Provide leads that are compatible with CRM
Goal 2: Provide individual agent tools
a. Provide agents with industry best customer relationship
management platform
b. Grant access to agent-run website with tools to maximize the
transaction process
c. Enable access to best practices education and training to
support continued professional growth
Goal 3: Support brokers with beyond market standard tools
a. Sustain a state-of-the-art CRM system to enable maximum
efficiency for broker’s team
b. Provide robust lead routing to support broker’s team success
c. Create enhanced branding materials that enable broker’s team
to demonstrate true professionalism
d. Deliver the most innovative tools and education that meet the
needs of the changing real estate industry
Mission
The mission is an essential piece of every business. It
articulates an organization’s purpose, or reason for existence
and generally discusses what the organization hopes to become
(i.e. its strategic vision). A strong mission statement becomes
the foundation for decisions and core values and a compass of
sorts for leading the business in the right directions. It is a tool
for guiding the customer service and staff expectations as well.
When a business is starting out or going through change,
defining a mission statement is a critical step.
A company’s mission statement and goals should feel
symbiotic. The mission is broad and needs goals to direct
achievement; while the goals have limited value without the
vision captured within the mission. The mission statement may
also serve as a guide for whom the business serves and how it
serves them.
Goal
To monitor and evaluate a mission statement, it is essential to
incorporate goals. These goals outline the connection between
the mission and the operational aspects of the business. The
outcome of the goals will help to drive the development of
objectives that can be used to precisely measure the business’s
effectiveness in living up to the mission statement.

More Related Content

Similar to 1. Original Post by Catherine JohnsonCryptographic MethodsC

Network Security
Network SecurityNetwork Security
Network SecurityBeth Hall
 
Hirsch Identive | White Paper | Securing the Enterprise in a Networked World
Hirsch Identive | White Paper | Securing the Enterprise in a Networked WorldHirsch Identive | White Paper | Securing the Enterprise in a Networked World
Hirsch Identive | White Paper | Securing the Enterprise in a Networked WorldIdentive
 
Isaca global journal - choosing the most appropriate data security solution ...
Isaca global journal  - choosing the most appropriate data security solution ...Isaca global journal  - choosing the most appropriate data security solution ...
Isaca global journal - choosing the most appropriate data security solution ...Ulf Mattsson
 
Securing And Protecting Information
Securing And Protecting InformationSecuring And Protecting Information
Securing And Protecting InformationLaura Martin
 
Securing Your Intellectual Property: Preventing Business IP Leaks
Securing Your Intellectual Property: Preventing Business IP LeaksSecuring Your Intellectual Property: Preventing Business IP Leaks
Securing Your Intellectual Property: Preventing Business IP LeaksHokme
 
Cyber Security Matters a book by Hama David Bundo
Cyber Security Matters a book by Hama David BundoCyber Security Matters a book by Hama David Bundo
Cyber Security Matters a book by Hama David Bundohdbundo
 
Design and Development of an E-Commerce Security Using RSA Cryptosystem
Design and Development of an E-Commerce Security Using RSA CryptosystemDesign and Development of an E-Commerce Security Using RSA Cryptosystem
Design and Development of an E-Commerce Security Using RSA CryptosystemAM Publications,India
 
10.1.1.436.3364.pdf
10.1.1.436.3364.pdf10.1.1.436.3364.pdf
10.1.1.436.3364.pdfmistryritesh
 
Encryption During Communication
Encryption During CommunicationEncryption During Communication
Encryption During CommunicationPECB
 

Similar to 1. Original Post by Catherine JohnsonCryptographic MethodsC (12)

13_2
13_213_2
13_2
 
Network Security
Network SecurityNetwork Security
Network Security
 
Hirsch Identive | White Paper | Securing the Enterprise in a Networked World
Hirsch Identive | White Paper | Securing the Enterprise in a Networked WorldHirsch Identive | White Paper | Securing the Enterprise in a Networked World
Hirsch Identive | White Paper | Securing the Enterprise in a Networked World
 
Isaca global journal - choosing the most appropriate data security solution ...
Isaca global journal  - choosing the most appropriate data security solution ...Isaca global journal  - choosing the most appropriate data security solution ...
Isaca global journal - choosing the most appropriate data security solution ...
 
Securing And Protecting Information
Securing And Protecting InformationSecuring And Protecting Information
Securing And Protecting Information
 
Securing Your Intellectual Property: Preventing Business IP Leaks
Securing Your Intellectual Property: Preventing Business IP LeaksSecuring Your Intellectual Property: Preventing Business IP Leaks
Securing Your Intellectual Property: Preventing Business IP Leaks
 
Cyber Security Matters a book by Hama David Bundo
Cyber Security Matters a book by Hama David BundoCyber Security Matters a book by Hama David Bundo
Cyber Security Matters a book by Hama David Bundo
 
Data security and privacy
Data security and privacyData security and privacy
Data security and privacy
 
Design and Development of an E-Commerce Security Using RSA Cryptosystem
Design and Development of an E-Commerce Security Using RSA CryptosystemDesign and Development of an E-Commerce Security Using RSA Cryptosystem
Design and Development of an E-Commerce Security Using RSA Cryptosystem
 
A01450131
A01450131A01450131
A01450131
 
10.1.1.436.3364.pdf
10.1.1.436.3364.pdf10.1.1.436.3364.pdf
10.1.1.436.3364.pdf
 
Encryption During Communication
Encryption During CommunicationEncryption During Communication
Encryption During Communication
 

More from SantosConleyha

11Getting Started with PhoneGapWHAT’S IN THIS CHAPTER
11Getting Started with PhoneGapWHAT’S IN THIS CHAPTER11Getting Started with PhoneGapWHAT’S IN THIS CHAPTER
11Getting Started with PhoneGapWHAT’S IN THIS CHAPTERSantosConleyha
 
11Proposal Part One - Part 1 Influence of Internet on Tourism
11Proposal Part One - Part 1 Influence of Internet on Tourism11Proposal Part One - Part 1 Influence of Internet on Tourism
11Proposal Part One - Part 1 Influence of Internet on TourismSantosConleyha
 
11Social Inclusion of Deaf with Hearing Congre
11Social Inclusion of Deaf with Hearing Congre11Social Inclusion of Deaf with Hearing Congre
11Social Inclusion of Deaf with Hearing CongreSantosConleyha
 
11Managing Economies of Scale in a Supply Chain Cycle Invento
11Managing Economies of Scale in a Supply Chain Cycle Invento11Managing Economies of Scale in a Supply Chain Cycle Invento
11Managing Economies of Scale in a Supply Chain Cycle InventoSantosConleyha
 
11Mental Health Among College StudentsTomia Willin
11Mental Health Among College StudentsTomia Willin11Mental Health Among College StudentsTomia Willin
11Mental Health Among College StudentsTomia WillinSantosConleyha
 
11From Introductions to ConclusionsDrafting an EssayIn this chap
11From Introductions to ConclusionsDrafting an EssayIn this chap11From Introductions to ConclusionsDrafting an EssayIn this chap
11From Introductions to ConclusionsDrafting an EssayIn this chapSantosConleyha
 
11Groupthink John SmithCampbellsville Univ
11Groupthink John SmithCampbellsville Univ11Groupthink John SmithCampbellsville Univ
11Groupthink John SmithCampbellsville UnivSantosConleyha
 
11Sun Coast Remediation Research Objectives, Research Que
11Sun Coast Remediation Research Objectives, Research Que11Sun Coast Remediation Research Objectives, Research Que
11Sun Coast Remediation Research Objectives, Research QueSantosConleyha
 
11Me Talk Pretty One Day # By David Sedaris From his b
11Me Talk Pretty One Day # By David Sedaris From his b11Me Talk Pretty One Day # By David Sedaris From his b
11Me Talk Pretty One Day # By David Sedaris From his bSantosConleyha
 
11Program analysis using different perspectives
11Program analysis using different perspectives11Program analysis using different perspectives
11Program analysis using different perspectivesSantosConleyha
 
11Factors that Affect the Teaching and Learning Process
11Factors that Affect the Teaching and Learning Process11Factors that Affect the Teaching and Learning Process
11Factors that Affect the Teaching and Learning ProcessSantosConleyha
 
11Criminal Justice Racial discriminationStudent’s Nam
11Criminal Justice Racial discriminationStudent’s Nam11Criminal Justice Racial discriminationStudent’s Nam
11Criminal Justice Racial discriminationStudent’s NamSantosConleyha
 
11Communication Plan for Manufacturing PlantStud
11Communication Plan for Manufacturing PlantStud11Communication Plan for Manufacturing PlantStud
11Communication Plan for Manufacturing PlantStudSantosConleyha
 
11CapitalKarl MarxPART I. COMMODITIES AND MONEYCHAPTER I.
11CapitalKarl MarxPART I. COMMODITIES AND MONEYCHAPTER I. 11CapitalKarl MarxPART I. COMMODITIES AND MONEYCHAPTER I.
11CapitalKarl MarxPART I. COMMODITIES AND MONEYCHAPTER I. SantosConleyha
 
11Criminal Justice SystemShambri Chill
11Criminal Justice SystemShambri Chill11Criminal Justice SystemShambri Chill
11Criminal Justice SystemShambri ChillSantosConleyha
 
11American Government and Politics in a Racially Divid
11American Government and Politics in a Racially Divid11American Government and Politics in a Racially Divid
11American Government and Politics in a Racially DividSantosConleyha
 
11Cancer is the uncontrollable growth of abnormal cells
11Cancer is the uncontrollable growth of abnormal cells11Cancer is the uncontrollable growth of abnormal cells
11Cancer is the uncontrollable growth of abnormal cellsSantosConleyha
 
11SENSE MAKING Runze DuChee PiongBUS 700 L
11SENSE MAKING Runze DuChee PiongBUS 700 L11SENSE MAKING Runze DuChee PiongBUS 700 L
11SENSE MAKING Runze DuChee PiongBUS 700 LSantosConleyha
 
119E ECUTIVE BAR AININ CEOS NE OTIATIN THEIR PAWITH EM
119E ECUTIVE BAR AININ  CEOS NE OTIATIN THEIR PAWITH EM119E ECUTIVE BAR AININ  CEOS NE OTIATIN THEIR PAWITH EM
119E ECUTIVE BAR AININ CEOS NE OTIATIN THEIR PAWITH EMSantosConleyha
 
11CALIFORNIA MANAGEMENT REVIEW VOL. 51, NO. 4 SUMMER 2009 C
11CALIFORNIA MANAGEMENT REVIEW  VOL. 51, NO. 4  SUMMER 2009  C11CALIFORNIA MANAGEMENT REVIEW  VOL. 51, NO. 4  SUMMER 2009  C
11CALIFORNIA MANAGEMENT REVIEW VOL. 51, NO. 4 SUMMER 2009 CSantosConleyha
 

More from SantosConleyha (20)

11Getting Started with PhoneGapWHAT’S IN THIS CHAPTER
11Getting Started with PhoneGapWHAT’S IN THIS CHAPTER11Getting Started with PhoneGapWHAT’S IN THIS CHAPTER
11Getting Started with PhoneGapWHAT’S IN THIS CHAPTER
 
11Proposal Part One - Part 1 Influence of Internet on Tourism
11Proposal Part One - Part 1 Influence of Internet on Tourism11Proposal Part One - Part 1 Influence of Internet on Tourism
11Proposal Part One - Part 1 Influence of Internet on Tourism
 
11Social Inclusion of Deaf with Hearing Congre
11Social Inclusion of Deaf with Hearing Congre11Social Inclusion of Deaf with Hearing Congre
11Social Inclusion of Deaf with Hearing Congre
 
11Managing Economies of Scale in a Supply Chain Cycle Invento
11Managing Economies of Scale in a Supply Chain Cycle Invento11Managing Economies of Scale in a Supply Chain Cycle Invento
11Managing Economies of Scale in a Supply Chain Cycle Invento
 
11Mental Health Among College StudentsTomia Willin
11Mental Health Among College StudentsTomia Willin11Mental Health Among College StudentsTomia Willin
11Mental Health Among College StudentsTomia Willin
 
11From Introductions to ConclusionsDrafting an EssayIn this chap
11From Introductions to ConclusionsDrafting an EssayIn this chap11From Introductions to ConclusionsDrafting an EssayIn this chap
11From Introductions to ConclusionsDrafting an EssayIn this chap
 
11Groupthink John SmithCampbellsville Univ
11Groupthink John SmithCampbellsville Univ11Groupthink John SmithCampbellsville Univ
11Groupthink John SmithCampbellsville Univ
 
11Sun Coast Remediation Research Objectives, Research Que
11Sun Coast Remediation Research Objectives, Research Que11Sun Coast Remediation Research Objectives, Research Que
11Sun Coast Remediation Research Objectives, Research Que
 
11Me Talk Pretty One Day # By David Sedaris From his b
11Me Talk Pretty One Day # By David Sedaris From his b11Me Talk Pretty One Day # By David Sedaris From his b
11Me Talk Pretty One Day # By David Sedaris From his b
 
11Program analysis using different perspectives
11Program analysis using different perspectives11Program analysis using different perspectives
11Program analysis using different perspectives
 
11Factors that Affect the Teaching and Learning Process
11Factors that Affect the Teaching and Learning Process11Factors that Affect the Teaching and Learning Process
11Factors that Affect the Teaching and Learning Process
 
11Criminal Justice Racial discriminationStudent’s Nam
11Criminal Justice Racial discriminationStudent’s Nam11Criminal Justice Racial discriminationStudent’s Nam
11Criminal Justice Racial discriminationStudent’s Nam
 
11Communication Plan for Manufacturing PlantStud
11Communication Plan for Manufacturing PlantStud11Communication Plan for Manufacturing PlantStud
11Communication Plan for Manufacturing PlantStud
 
11CapitalKarl MarxPART I. COMMODITIES AND MONEYCHAPTER I.
11CapitalKarl MarxPART I. COMMODITIES AND MONEYCHAPTER I. 11CapitalKarl MarxPART I. COMMODITIES AND MONEYCHAPTER I.
11CapitalKarl MarxPART I. COMMODITIES AND MONEYCHAPTER I.
 
11Criminal Justice SystemShambri Chill
11Criminal Justice SystemShambri Chill11Criminal Justice SystemShambri Chill
11Criminal Justice SystemShambri Chill
 
11American Government and Politics in a Racially Divid
11American Government and Politics in a Racially Divid11American Government and Politics in a Racially Divid
11American Government and Politics in a Racially Divid
 
11Cancer is the uncontrollable growth of abnormal cells
11Cancer is the uncontrollable growth of abnormal cells11Cancer is the uncontrollable growth of abnormal cells
11Cancer is the uncontrollable growth of abnormal cells
 
11SENSE MAKING Runze DuChee PiongBUS 700 L
11SENSE MAKING Runze DuChee PiongBUS 700 L11SENSE MAKING Runze DuChee PiongBUS 700 L
11SENSE MAKING Runze DuChee PiongBUS 700 L
 
119E ECUTIVE BAR AININ CEOS NE OTIATIN THEIR PAWITH EM
119E ECUTIVE BAR AININ  CEOS NE OTIATIN THEIR PAWITH EM119E ECUTIVE BAR AININ  CEOS NE OTIATIN THEIR PAWITH EM
119E ECUTIVE BAR AININ CEOS NE OTIATIN THEIR PAWITH EM
 
11CALIFORNIA MANAGEMENT REVIEW VOL. 51, NO. 4 SUMMER 2009 C
11CALIFORNIA MANAGEMENT REVIEW  VOL. 51, NO. 4  SUMMER 2009  C11CALIFORNIA MANAGEMENT REVIEW  VOL. 51, NO. 4  SUMMER 2009  C
11CALIFORNIA MANAGEMENT REVIEW VOL. 51, NO. 4 SUMMER 2009 C
 

Recently uploaded

Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsanshu789521
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxNirmalaLoungPoorunde1
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon AUnboundStockton
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptxVS Mahajan Coaching Centre
 
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdfLike-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdfMr Bounab Samir
 
MICROBIOLOGY biochemical test detailed.pptx
MICROBIOLOGY biochemical test detailed.pptxMICROBIOLOGY biochemical test detailed.pptx
MICROBIOLOGY biochemical test detailed.pptxabhijeetpadhi001
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxOH TEIK BIN
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTiammrhaywood
 
CELL CYCLE Division Science 8 quarter IV.pptx
CELL CYCLE Division Science 8 quarter IV.pptxCELL CYCLE Division Science 8 quarter IV.pptx
CELL CYCLE Division Science 8 quarter IV.pptxJiesonDelaCerna
 
MARGINALIZATION (Different learners in Marginalized Group
MARGINALIZATION (Different learners in Marginalized GroupMARGINALIZATION (Different learners in Marginalized Group
MARGINALIZATION (Different learners in Marginalized GroupJonathanParaisoCruz
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdfssuser54595a
 
Painted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaPainted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaVirag Sontakke
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxSayali Powar
 
Final demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptxFinal demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptxAvyJaneVismanos
 
Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Celine George
 

Recently uploaded (20)

Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha elections
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptx
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon A
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
 
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdfLike-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
 
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
 
MICROBIOLOGY biochemical test detailed.pptx
MICROBIOLOGY biochemical test detailed.pptxMICROBIOLOGY biochemical test detailed.pptx
MICROBIOLOGY biochemical test detailed.pptx
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptx
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
 
CELL CYCLE Division Science 8 quarter IV.pptx
CELL CYCLE Division Science 8 quarter IV.pptxCELL CYCLE Division Science 8 quarter IV.pptx
CELL CYCLE Division Science 8 quarter IV.pptx
 
MARGINALIZATION (Different learners in Marginalized Group
MARGINALIZATION (Different learners in Marginalized GroupMARGINALIZATION (Different learners in Marginalized Group
MARGINALIZATION (Different learners in Marginalized Group
 
9953330565 Low Rate Call Girls In Rohini Delhi NCR
9953330565 Low Rate Call Girls In Rohini  Delhi NCR9953330565 Low Rate Call Girls In Rohini  Delhi NCR
9953330565 Low Rate Call Girls In Rohini Delhi NCR
 
ESSENTIAL of (CS/IT/IS) class 06 (database)
ESSENTIAL of (CS/IT/IS) class 06 (database)ESSENTIAL of (CS/IT/IS) class 06 (database)
ESSENTIAL of (CS/IT/IS) class 06 (database)
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
 
Painted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaPainted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of India
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
 
Final demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptxFinal demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptx
 
Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17
 

1. Original Post by Catherine JohnsonCryptographic MethodsC

  • 1. 1. Original Post by Catherine Johnson Cryptographic Methods: Cryptography is the science of concealing information or encrypting information. Computers use complex cryptographic algorithms to enable data protection, data hiding, integrity checks, nonrepudiation services, policy enforcement, key management, and exchange, and many more (Conklin, 2018). Cryptography is classified into three types symmetric cryptography, asymmetric cryptography, and hash functions Symmetric cryptography is also known as secret-key cryptography. It uses a single key to encrypt and decrypt data making it the simplest type of cryptography. A plain text with the key produces the same cipher similarly, the ciphertext with the key produces the plain text. "Symmetric encryption is useful for protecting data between parties with an established shared key and is also frequently used to store confidential data" (Burnett & Foster, 2004). This type of cryptography is suited for bulk encryption as it is fast and easy. Asymmetric cryptography is also known as public-key cryptography. In this method, two keys are used to encrypt data. One for encoding and the other for decoding. One of the two keys stays private while the other is shared. The algorithms are based on integer factorization and discrete logarithmic problems. This encryption method is used for authentication and confidentiality. The hash function is a special mathematical function. It performs a one-way function, which means that once the algorithm is processed, there is no feasible way to use the ciphertext to retrieve the plaintext that was used to generate it (Conklin, 2018). Hashes provide confidentiality but not integrity because even though we cannot determine the original
  • 2. text, we can ascertain the modified text. These are utilized in programs, text messages, and operating systems files. Public Key Infrastructure (PKI): It is an infrastructure that enables users to communicate securely. PKI uses the asymmetric method; one private key and one public key. The public key can only decrypt the file encrypted by the private key, which affirms the receiver and the sender's information is secure during a transaction. The challenges PKI face is the storage and protection of the keys. The encryption keys can be stolen or unrecoverable based on the measures taken to store them. Additionally, failure to issue and renew certificates can cause large-scale connectivity issues. Physical Security: Physical security needs to be maintained to prevent attackers from gaining access to steal data. Physical security is essential in an organization to prevent unauthorized individuals from causing harm to the business. If systems and devices are physically accessed, all files, data, information, and networks can be compromised. Granting limited access to employees to computer rooms or server rooms can prevent theft and help with intentional and unintentional damages. Perimeter security is also important, especially for sites and server access. Furthermore, device management is crucial as well because stolen devices can cause data breaches. Organizations should implement endpoint security management to access devices outside the company's network and keep them safe. References Conklin, Wm., A. et al. Principles of computer security: CompTIA security and beyond, fifth edition. Available from: Slingshot eReader, (5th Edition). McGraw-Hill Professional, 2018. Burnett. M, Foster. J. C. 2004. Hacking the code ASP.Net web application
  • 3. security. https://www.sciencedirect.com/topics/computer- science/symmetric-cryptography 2. Original Post from Ayesha Syeda They cannot protect everything against every threat. However, as we continue to expand our definition of threat, we can identify more threat types and better evaluate their impact on a business, including all the factors that go into designing a technological solution. When we apply technology to create new ideas, we can call the resulting new product or service a threat since it is something that increases the cost of doing busi ness or causes competitors to re-evaluate where they are in the competitive hierarchy. For a company to be classified as a threat, it must: Have created, in some form or fashion, a product or service that has a market share of more than 30% and Have had a significant technological change that increases the cost of
  • 4. doing business by more than 20%. The threat must be significant enough to create a market opportunity for the company. The danger is that the threat increases the pressure on the organization to act quickly because, in the meantime, the company is in a quandary because of the risk that the information might be used against them by competitors, as one example, or the information might damage a competitor's reputation. A solution can be to develop a system that will send alerts when there is a change in the information. This might require information systems that allow the users to track changes in the data. The company should have administrative, training, and educational staff to maintain control. As a company expands across national markets, the number of people in the country that need to be trained to serve the foreign market should be relatively small. In such cases, it is common to have multiple people who perform different tasks so that one specialist may need to be trained in one country and another in another. Cryptographic weaknesses might be related to different classes of weaknesses, including the weaknesses in software design, the vulnerabilities of hardware, the weaknesses in communicatio n and security networks, and others. Different cryptosystems can address two main types of weaknesses. A weakness in software design can be addressed by a software implementation that implements a robust design and provides several security features. For example, the device has a fingerprint scanner that can identify the person entering and leaving the hotel and stores the hotel guest's name, phone number, and email address. Furthermore, the hotel provides a free Wi-Fi password if someone uses one of the hotel's mobile phones in the hotel premises without permission. The hotel provides a service to guests to remotely connect their mobile phones to their Wi -Fi network. If a guest does not have the required device, they can connect their mobile phone to this application and use this data to charge their card. Once charged, the device is sent to the guest's mobile phone. The mobile phone then connects to the
  • 5. charging station and allows the guest to use this card to continue their journey. There is no additional charge when using a mobile phone as a payment terminal. The key for PKI is the identification of valid and invalid transactions within the transactions. We define valid as "anyone transaction that meets the following conditions": The transaction inputs are valid. The transaction outputs are valid. The inputs are included in one of the inputs and are not modified. The outputs are included in one of the outputs and are not modified. We use three examples for validation. We consider a peer-to-peer instant messaging protocol as an example. The basic idea is the simple one. It allows anyone in the world to send an encrypted message in real-time. This means that no one will be able to read anything until the message is received by a third party and is decrypted. This is what makes instant messaging worthwhile. However, the messages contained within them are compassionate and easy to track. It also means that the sender of the secret message has access to it forever (Cambou et al., 2019). In addition to this, the sender also needs to be aware of the recipient's location. If the recipient is in the same room as him/her, it is more challenging to get secure communication, and hence it is best to encrypt this session. For instance, senders can encrypt their messages only with the cipher AES or RSA, which means they cannot decrypt them by brute force. If this is the case, the sender needs to change the recipient's destination or choose a different cipher and thus create a new session. An excellent place to start is by examining their organization's physical control procedures. These controls can be implemented via the training of key personnel, written policies, rules, or management processes. The security management team needs to know how to assess the security of the organization's information systems to ensure that they are capable of maintaining and restoring data that is lost or stolen, as well as the availability of data and information to allow the success of business operations. This requires an understanding of
  • 6. technology, security, and digital transformation in the digital era. At ICAP, the security team is constantly challenged with deciding what new information technology applications to add to the existing inventory management system. The most obvious potential application would be in the handling of customer information. It is known that the use of an ERP system can provide more excellent information quality and lower inventory levels. However, integrating electronic and physical data within the same data warehouse can make the system more complex. However, as the number of physical elements in an electronic database increase, it is easier for IT to integrate data into the system. IT can also benefit from developing processes for storing and analyzing structured information. This analysis is often undertaken using software applications, such as structured reporting or text mining. Reference: Cambou, B., Philabaum, C., Booher, D., & Telesca, D. A. (2019, March). Response-based cryptographic methods with ternary physical unclonable functions. In Future of Information and Communication Conference (pp. 781-800). Springer, Cham. Homework 1: Challenges to Present-Day Marketers 1 page answer Answer each question 1. In your own words, identify three of the greatest challenges to present-day marketing managers. Do NOT refer to the text, or any outside reference. 2. Provide a real-world example of each of the challenges you identified. 3. For EACH of the examples you gave, provide a recommended solution (or solutions) to overcoming the challenge.
  • 7. Homework 2 : (1 page answer) Healthy Happy Homes After two decades of real estate investing, Healthy Happy Homes’ owner wanted to combine two personal passions: real estate and living a quality, healthy life. After creating a Healthy Home Checklist to review the environmental quality of the living space (i.e., fabric, floor, cleaning supplies, air quality, area hazards, etc.), Healthy Happy Homes provides consultations with renters, current owners, potential buyers/ sellers to analyze and improve the quality of the living environment to guide purchasing and/or renovation decisions. In addition to the Healthy Home Checklist, Healthy Happy Homes has generated a content-based educational series on social media and speaking events to inform business and individuals about seeking, developing, and maintaining a quality living environment. To complement the mission, Healthy Happy Homes has compiled a database of businesses and contractors that provided checklist-approved quality environmental services such as organic fabric window treatments, clean air floors, organic cleaning supplies, and quality construction materials. Mission: To empower/enable the highest quality of living in the purest environment Healthy Happy Homes has a mission statement yet is missing the goals that will serve in the development of measurable, achievable objectives for growing its business. Using the sample mission and goals in the example case a model (example
  • 8. on next page), and after reviewing the description of Happy Healthy Homes, write three to five goals with bullet points. As you are working on your objectives, consider these guiding questions: Mission: Big picture vision · Does mission describe the overall “why” a company exists? · What unique vision does the Mission Statement describe? · What core values and principles does the company represent? Objectives: Measurable, obtainable outcomes · How does your company maintain profitability? · How does your company present customer service? · What core values define your company’s growth, marketing, and interaction? · What aspects of managing change and marketing are important to your company? · What expectations do you have for your company and customer interaction Sample Mission and Objectives Realty Business Leaders (RBL) RBL began in 1996, to provide supportive digital technology solutions for professionals in the real estate industry. They serve agents, brokers, and investors in both residential and commercial applications. They provide online, digital, and print resources and tools for generating leads, supporting individual agents and brokers to successfully grow and manage their businesses. RBL’s cloud -based subscriptions provide total access to marketing and sales software such as websites, customer relationship management (CRM), lead generation, goal tracking, and training materials that support conversion of
  • 9. prospects into clients. Mission: To empower real estate industry professionals in exceeding property buyers’ and sellers’ expectations through innovative, accessible technology Sample Goals: Goal 1: Provide exceptional, best practice, innovative lead generation tools a. Provide exclusive qualified lead generation b. Generate real-time analytics to provide intuitive activity and insights c. Provide leads that are compatible with CRM Goal 2: Provide individual agent tools a. Provide agents with industry best customer relationship management platform b. Grant access to agent-run website with tools to maximize the transaction process c. Enable access to best practices education and training to support continued professional growth Goal 3: Support brokers with beyond market standard tools a. Sustain a state-of-the-art CRM system to enable maximum efficiency for broker’s team b. Provide robust lead routing to support broker’s team success c. Create enhanced branding materials that enable broker’s team to demonstrate true professionalism d. Deliver the most innovative tools and education that meet the needs of the changing real estate industry Mission The mission is an essential piece of every business. It articulates an organization’s purpose, or reason for existence
  • 10. and generally discusses what the organization hopes to become (i.e. its strategic vision). A strong mission statement becomes the foundation for decisions and core values and a compass of sorts for leading the business in the right directions. It is a tool for guiding the customer service and staff expectations as well. When a business is starting out or going through change, defining a mission statement is a critical step. A company’s mission statement and goals should feel symbiotic. The mission is broad and needs goals to direct achievement; while the goals have limited value without the vision captured within the mission. The mission statement may also serve as a guide for whom the business serves and how it serves them. Goal To monitor and evaluate a mission statement, it is essential to incorporate goals. These goals outline the connection between the mission and the operational aspects of the business. The outcome of the goals will help to drive the development of objectives that can be used to precisely measure the business’s effectiveness in living up to the mission statement.