SlideShare a Scribd company logo
1 of 3
Discussion 2 – Emerging Threat & counter Measures
Malicious individuals have discovered several methods to attack
and defeat cryptosystems. It's important that understand the
threats posed by cryptographic attacks to minimize the risks to
your network systems.
Identify one cryptographic attack and how you can protect
against it.
At least one scholarly source should be used in the initial
discussion thread. Be sure to use information from your
readings and other sources from the UC Library. Use proper
citations and references in your post.
350-400 Words
Readings
BURKE, MCDONALD, J., & AUSTIN, T. (2000).
Architectural support for fast symmetric-key
cryptography. Operating Systems Review, 34(5), 178–189.
Diffie, & Hellman, M. (1976).
New directions in cryptography. IEEE Transactions on
Information Theory, 22(6), 644–654.
Discussion 2 – Human Computer inter & usability
After reading Chapter 5, how do you feel that social interaction
has change the way a designer measures usability and human
interaction? You are required to write a statement that
is LIMITED to 150 words. This is an opinion question;
therefore, research is not required. Should you cite the work of
others, please provide the source of your opinion in APA
format.
Readings
· Chapter 5, Interaction Design 5th Edition
· Siricharoen, W. V. (1970, January 1). Understanding social
interaction with human computer interaction (HCI) adaptation.
Go to start page! Retrieved from
https://eprints.eudl.eu/id/eprint/284/
TextBook
Title: Interaction Design
ISBN: 9780470665763
Authors: Yvonne Rogers, Helen Sharp, Jenny Preece
Publisher: John Wiley & Sons
Publication Date: 2011-06-07
Discussion 1 – InfoTech Import in Strat Plan
Discuss an organization’s need for physical security. What
methods, approaches, and models can be used by organizations
when designing physical security needs? Lastly, explain how
these security measures will safeguard the organization.
At least one scholarly source should be used in the initial
discussion thread. Be sure to use information from your
readings and other sources from the UC Library. Use proper
citations and references in your post.
350-400 Words
Text-Book
Title: Managing and Using Information Systems
ISBN: 9781119560562
Authors: Keri E. Pearlson, Carol S. Saunders, Dennis F.
Galletta
Publisher: John Wiley & Sons
Publication Date: 2019-12-05
Readings:
Yaokumah, W., & Brown, S. (2014).
An empirical examination of the relationship between
information security/business strategic alignment and
information security governance domain areas. Journal of Law
and Governance, 9(2).
Vincent, N. E., & Pinsker, R. (2020).
IT risk management: interrelationships based on
strategy implementation. International Journal of Accounting &
Information Management.
R. Sari, R. Kosala, B. Ranti and S. H. Supangkat,
"COSO Framework for Warehouse Management Internal
Control Evaluation: Enabling Smart Warehouse
Systems," 2018 International Conference on ICT for Smart
Society (ICISS), 2018, pp. 1-5.
Eric Buhrendorf. (2019).
Outsourcing IT is a money-saving cyber safety net for
company data. Fairfield County Business Journal, 55(20), 12–
12.

More Related Content

More from TaunyaCoffman887

PAPER 1ABSTRACTThis paper takes a peak within the criminal
PAPER 1ABSTRACTThis paper takes a peak within the criminalPAPER 1ABSTRACTThis paper takes a peak within the criminal
PAPER 1ABSTRACTThis paper takes a peak within the criminal
TaunyaCoffman887
 
NRNPPRAC 6665 & 6675 Focused SOAP Psychiatric Evaluation Exemplar
NRNPPRAC 6665 & 6675 Focused SOAP Psychiatric Evaluation ExemplarNRNPPRAC 6665 & 6675 Focused SOAP Psychiatric Evaluation Exemplar
NRNPPRAC 6665 & 6675 Focused SOAP Psychiatric Evaluation Exemplar
TaunyaCoffman887
 
PLEASE READ CAREFULLY- Please use APA (7th edition) formatting
PLEASE READ CAREFULLY- Please use APA (7th edition) formattingPLEASE READ CAREFULLY- Please use APA (7th edition) formatting
PLEASE READ CAREFULLY- Please use APA (7th edition) formatting
TaunyaCoffman887
 
Mass shootings – a short researchBackgroundA subset of nationa
Mass shootings – a short researchBackgroundA subset of nationaMass shootings – a short researchBackgroundA subset of nationa
Mass shootings – a short researchBackgroundA subset of nationa
TaunyaCoffman887
 
Discussion CultureYou are socialized within a culture the momen
Discussion CultureYou are socialized within a culture the momenDiscussion CultureYou are socialized within a culture the momen
Discussion CultureYou are socialized within a culture the momen
TaunyaCoffman887
 
Develop a 4-6 page holistic intervention plan design to improve th
Develop a 4-6 page holistic intervention plan design to improve thDevelop a 4-6 page holistic intervention plan design to improve th
Develop a 4-6 page holistic intervention plan design to improve th
TaunyaCoffman887
 
Copyright 2022 Post University. ALL RIGHTS RESERVED
Copyright 2022 Post University. ALL RIGHTS RESERVED  Copyright 2022 Post University. ALL RIGHTS RESERVED
Copyright 2022 Post University. ALL RIGHTS RESERVED
TaunyaCoffman887
 
Adapted from the PICOT Questions Template; Ellen Fineout-Overh
Adapted from the PICOT Questions Template; Ellen Fineout-OverhAdapted from the PICOT Questions Template; Ellen Fineout-Overh
Adapted from the PICOT Questions Template; Ellen Fineout-Overh
TaunyaCoffman887
 
1Felicity S. MillerDate April XX, 2022 Preparer
1Felicity S. MillerDate April XX, 2022 Preparer 1Felicity S. MillerDate April XX, 2022 Preparer
1Felicity S. MillerDate April XX, 2022 Preparer
TaunyaCoffman887
 
Unit II Assignment WorksheetThis worksheet is intended to help y
Unit II Assignment WorksheetThis worksheet is intended to help yUnit II Assignment WorksheetThis worksheet is intended to help y
Unit II Assignment WorksheetThis worksheet is intended to help y
TaunyaCoffman887
 
© The Author(s) 2017. Published by Oxford University Press on
© The Author(s) 2017. Published by Oxford University Press on © The Author(s) 2017. Published by Oxford University Press on
© The Author(s) 2017. Published by Oxford University Press on
TaunyaCoffman887
 
[Name of Capstone Paper][Student Name] University
[Name of Capstone Paper][Student Name] University [Name of Capstone Paper][Student Name] University
[Name of Capstone Paper][Student Name] University
TaunyaCoffman887
 
Unlimited Attempts AllowedDetailsVirtual Labs  Dumping and Crac
Unlimited Attempts AllowedDetailsVirtual Labs  Dumping and CracUnlimited Attempts AllowedDetailsVirtual Labs  Dumping and Crac
Unlimited Attempts AllowedDetailsVirtual Labs  Dumping and Crac
TaunyaCoffman887
 

More from TaunyaCoffman887 (20)

PAPER 1ABSTRACTThis paper takes a peak within the criminal
PAPER 1ABSTRACTThis paper takes a peak within the criminalPAPER 1ABSTRACTThis paper takes a peak within the criminal
PAPER 1ABSTRACTThis paper takes a peak within the criminal
 
NRNPPRAC 6665 & 6675 Focused SOAP Psychiatric Evaluation Exemplar
NRNPPRAC 6665 & 6675 Focused SOAP Psychiatric Evaluation ExemplarNRNPPRAC 6665 & 6675 Focused SOAP Psychiatric Evaluation Exemplar
NRNPPRAC 6665 & 6675 Focused SOAP Psychiatric Evaluation Exemplar
 
PLEASE READ CAREFULLY- Please use APA (7th edition) formatting
PLEASE READ CAREFULLY- Please use APA (7th edition) formattingPLEASE READ CAREFULLY- Please use APA (7th edition) formatting
PLEASE READ CAREFULLY- Please use APA (7th edition) formatting
 
Mass shootings – a short researchBackgroundA subset of nationa
Mass shootings – a short researchBackgroundA subset of nationaMass shootings – a short researchBackgroundA subset of nationa
Mass shootings – a short researchBackgroundA subset of nationa
 
I - Update Annotated bibliographyto educate yourself about
I - Update Annotated bibliographyto educate yourself aboutI - Update Annotated bibliographyto educate yourself about
I - Update Annotated bibliographyto educate yourself about
 
Discussion CultureYou are socialized within a culture the momen
Discussion CultureYou are socialized within a culture the momenDiscussion CultureYou are socialized within a culture the momen
Discussion CultureYou are socialized within a culture the momen
 
Given the growth in telecommuting and other mobile work arrangem
Given the growth in telecommuting and other mobile work arrangemGiven the growth in telecommuting and other mobile work arrangem
Given the growth in telecommuting and other mobile work arrangem
 
District management involves many important components (I.E., organi
District management involves many important components (I.E., organiDistrict management involves many important components (I.E., organi
District management involves many important components (I.E., organi
 
Develop a 4-6 page holistic intervention plan design to improve th
Develop a 4-6 page holistic intervention plan design to improve thDevelop a 4-6 page holistic intervention plan design to improve th
Develop a 4-6 page holistic intervention plan design to improve th
 
After studying the course materials located on Module 5 Lectu
After studying the course materials located on Module 5 LectuAfter studying the course materials located on Module 5 Lectu
After studying the course materials located on Module 5 Lectu
 
1. Big data is a common topic when discussing structured and uns
1. Big data is a common topic when discussing structured and uns1. Big data is a common topic when discussing structured and uns
1. Big data is a common topic when discussing structured and uns
 
Copyright 2022 Post University. ALL RIGHTS RESERVED
Copyright 2022 Post University. ALL RIGHTS RESERVED  Copyright 2022 Post University. ALL RIGHTS RESERVED
Copyright 2022 Post University. ALL RIGHTS RESERVED
 
Create two formative assessments. One assessment is for students
Create two formative assessments. One assessment is for studentsCreate two formative assessments. One assessment is for students
Create two formative assessments. One assessment is for students
 
Adapted from the PICOT Questions Template; Ellen Fineout-Overh
Adapted from the PICOT Questions Template; Ellen Fineout-OverhAdapted from the PICOT Questions Template; Ellen Fineout-Overh
Adapted from the PICOT Questions Template; Ellen Fineout-Overh
 
1Felicity S. MillerDate April XX, 2022 Preparer
1Felicity S. MillerDate April XX, 2022 Preparer 1Felicity S. MillerDate April XX, 2022 Preparer
1Felicity S. MillerDate April XX, 2022 Preparer
 
Unit II Assignment WorksheetThis worksheet is intended to help y
Unit II Assignment WorksheetThis worksheet is intended to help yUnit II Assignment WorksheetThis worksheet is intended to help y
Unit II Assignment WorksheetThis worksheet is intended to help y
 
© The Author(s) 2017. Published by Oxford University Press on
© The Author(s) 2017. Published by Oxford University Press on © The Author(s) 2017. Published by Oxford University Press on
© The Author(s) 2017. Published by Oxford University Press on
 
[Name of Capstone Paper][Student Name] University
[Name of Capstone Paper][Student Name] University [Name of Capstone Paper][Student Name] University
[Name of Capstone Paper][Student Name] University
 
Unlimited Attempts AllowedDetailsVirtual Labs  Dumping and Crac
Unlimited Attempts AllowedDetailsVirtual Labs  Dumping and CracUnlimited Attempts AllowedDetailsVirtual Labs  Dumping and Crac
Unlimited Attempts AllowedDetailsVirtual Labs  Dumping and Crac
 
What is the risk of not conducting a feasibility analysisHow ar
What is the risk of not conducting a feasibility analysisHow arWhat is the risk of not conducting a feasibility analysisHow ar
What is the risk of not conducting a feasibility analysisHow ar
 

Discussion 2 – Emerging Threat & counter MeasuresMalicious indiv

  • 1. Discussion 2 – Emerging Threat & counter Measures Malicious individuals have discovered several methods to attack and defeat cryptosystems. It's important that understand the threats posed by cryptographic attacks to minimize the risks to your network systems. Identify one cryptographic attack and how you can protect against it. At least one scholarly source should be used in the initial discussion thread. Be sure to use information from your readings and other sources from the UC Library. Use proper citations and references in your post. 350-400 Words Readings BURKE, MCDONALD, J., & AUSTIN, T. (2000). Architectural support for fast symmetric-key cryptography. Operating Systems Review, 34(5), 178–189. Diffie, & Hellman, M. (1976). New directions in cryptography. IEEE Transactions on Information Theory, 22(6), 644–654. Discussion 2 – Human Computer inter & usability After reading Chapter 5, how do you feel that social interaction has change the way a designer measures usability and human interaction? You are required to write a statement that is LIMITED to 150 words. This is an opinion question; therefore, research is not required. Should you cite the work of others, please provide the source of your opinion in APA format. Readings · Chapter 5, Interaction Design 5th Edition · Siricharoen, W. V. (1970, January 1). Understanding social
  • 2. interaction with human computer interaction (HCI) adaptation. Go to start page! Retrieved from https://eprints.eudl.eu/id/eprint/284/ TextBook Title: Interaction Design ISBN: 9780470665763 Authors: Yvonne Rogers, Helen Sharp, Jenny Preece Publisher: John Wiley & Sons Publication Date: 2011-06-07 Discussion 1 – InfoTech Import in Strat Plan Discuss an organization’s need for physical security. What methods, approaches, and models can be used by organizations when designing physical security needs? Lastly, explain how these security measures will safeguard the organization. At least one scholarly source should be used in the initial discussion thread. Be sure to use information from your readings and other sources from the UC Library. Use proper citations and references in your post. 350-400 Words Text-Book Title: Managing and Using Information Systems ISBN: 9781119560562 Authors: Keri E. Pearlson, Carol S. Saunders, Dennis F. Galletta Publisher: John Wiley & Sons Publication Date: 2019-12-05 Readings: Yaokumah, W., & Brown, S. (2014). An empirical examination of the relationship between information security/business strategic alignment and information security governance domain areas. Journal of Law and Governance, 9(2).
  • 3. Vincent, N. E., & Pinsker, R. (2020). IT risk management: interrelationships based on strategy implementation. International Journal of Accounting & Information Management. R. Sari, R. Kosala, B. Ranti and S. H. Supangkat, "COSO Framework for Warehouse Management Internal Control Evaluation: Enabling Smart Warehouse Systems," 2018 International Conference on ICT for Smart Society (ICISS), 2018, pp. 1-5. Eric Buhrendorf. (2019). Outsourcing IT is a money-saving cyber safety net for company data. Fairfield County Business Journal, 55(20), 12– 12.