Discussion 2 – Emerging Threat & counter Measures Malicious individuals have discovered several methods to attack and defeat cryptosystems. It's important that understand the threats posed by cryptographic attacks to minimize the risks to your network systems. Identify one cryptographic attack and how you can protect against it. At least one scholarly source should be used in the initial discussion thread. Be sure to use information from your readings and other sources from the UC Library. Use proper citations and references in your post. 350-400 Words Readings BURKE, MCDONALD, J., & AUSTIN, T. (2000). Architectural support for fast symmetric-key cryptography. Operating Systems Review, 34(5), 178–189. Diffie, & Hellman, M. (1976). New directions in cryptography. IEEE Transactions on Information Theory, 22(6), 644–654. Discussion 2 – Human Computer inter & usability After reading Chapter 5, how do you feel that social interaction has change the way a designer measures usability and human interaction? You are required to write a statement that is LIMITED to 150 words. This is an opinion question; therefore, research is not required. Should you cite the work of others, please provide the source of your opinion in APA format. Readings · Chapter 5, Interaction Design 5th Edition · Siricharoen, W. V. (1970, January 1). Understanding social interaction with human computer interaction (HCI) adaptation. Go to start page! Retrieved from https://eprints.eudl.eu/id/eprint/284/ TextBook Title: Interaction Design ISBN: 9780470665763 Authors: Yvonne Rogers, Helen Sharp, Jenny Preece Publisher: John Wiley & Sons Publication Date: 2011-06-07 Discussion 1 – InfoTech Import in Strat Plan Discuss an organization’s need for physical security. What methods, approaches, and models can be used by organizations when designing physical security needs? Lastly, explain how these security measures will safeguard the organization. At least one scholarly source should be used in the initial discussion thread. Be sure to use information from your readings and other sources from the UC Library. Use proper citations and references in your post. 350-400 Words Text-Book Title: Managing and Using Information Systems ISBN: 9781119560562 Authors: Keri E. Pearlson, Carol S. Saunders, Dennis F. Galletta Publisher: John Wiley & Sons Publication Date: 2019-12-05 Readings: Yaokumah, W., & Brown, S. (2014). An empirical examination of the relationship between information security/business strategic alignment and information security governance domain areas. Journal of Law and Governance, 9(2). Vincent, N. E., & Pinsker, R. (2020). IT risk management: interrelationships based on strategy implementation. International Journal of Accounting & Information Management. R. Sari, R. Kosala, B. Ranti and S. H. Supangkat, "COSO Framework for Warehouse Management Internal Control Evaluation: Enabling ...