SlideShare a Scribd company logo
New Content for Section 4: Technical Controls
This week will focus on using encryption to protect the
organization's data.
Describe the concept of
encryption.
Include a discussion about
symmetric
and
asymmetric
encryption.
Provide a description of at least 2 different encryption
algorithms.
When looking at data with respect to a database environment, it
should be viewed in 2 ways: the interaction (the transfer of
data) and the storage (the database files).
Take this opportunity to describe what is meant by
data at rest
and
data in motion.
How can encryption techniques be applied to these 2 concepts?
When applying encryption to a system, the confidentiality and
integrity of data is critical.
Show how encryption can provide protection in these 2 areas.
Describe the mechanisms that can be applied to messages (data
in motion) so that the following can be provided:
Confidentiality
Integrity
Authentication
This information should be 2–3 pages of details added to your
Data Security, Quality, and Integrity document.
New Content for Section 4 Technical ControlsThis week will focus .docx

More Related Content

Similar to New Content for Section 4 Technical ControlsThis week will focus .docx

File transfer with multiple security mechanism
File transfer with multiple security mechanismFile transfer with multiple security mechanism
File transfer with multiple security mechanism
Shubham Patil
 
Network security chapter 1
Network security   chapter 1Network security   chapter 1
Network security chapter 1
osama elfar
 
Data Security And The Security
Data Security And The SecurityData Security And The Security
Data Security And The Security
Rachel Phillips
 
A SURVEY ON RECENT APPROACHES COMBINING CRYPTOGRAPHY AND STEGANOGRAPHY
A SURVEY ON RECENT APPROACHES COMBINING CRYPTOGRAPHY AND STEGANOGRAPHYA SURVEY ON RECENT APPROACHES COMBINING CRYPTOGRAPHY AND STEGANOGRAPHY
A SURVEY ON RECENT APPROACHES COMBINING CRYPTOGRAPHY AND STEGANOGRAPHY
csandit
 
SECURED FREQUENT ITEMSET DISCOVERY IN MULTI PARTY DATA ENVIRONMENT FREQUENT I...
SECURED FREQUENT ITEMSET DISCOVERY IN MULTI PARTY DATA ENVIRONMENT FREQUENT I...SECURED FREQUENT ITEMSET DISCOVERY IN MULTI PARTY DATA ENVIRONMENT FREQUENT I...
SECURED FREQUENT ITEMSET DISCOVERY IN MULTI PARTY DATA ENVIRONMENT FREQUENT I...
Editor IJMTER
 
Solve Big Data Security Issues
Solve Big Data Security IssuesSolve Big Data Security Issues
Solve Big Data Security Issues
Editor IJCATR
 
Data and database security and controls
Data and database security and controlsData and database security and controls
Data and database security and controlsFITSFSd
 
A Personal Privacy Data Protection Scheme for Encryption and Revocation of Hi...
A Personal Privacy Data Protection Scheme for Encryption and Revocation of Hi...A Personal Privacy Data Protection Scheme for Encryption and Revocation of Hi...
A Personal Privacy Data Protection Scheme for Encryption and Revocation of Hi...
Shakas Technologies
 
Data attribute security and privacy in Collaborative distributed database Pub...
Data attribute security and privacy in Collaborative distributed database Pub...Data attribute security and privacy in Collaborative distributed database Pub...
Data attribute security and privacy in Collaborative distributed database Pub...
International Journal of Engineering Inventions www.ijeijournal.com
 
A Secure & Scalable Access Method in Cloud Computing
A Secure & Scalable Access Method in Cloud ComputingA Secure & Scalable Access Method in Cloud Computing
A Secure & Scalable Access Method in Cloud Computing
ijsrd.com
 
Cryptography introduction
Cryptography introductionCryptography introduction
Cryptography introduction
Vasuki Ramasamy
 
ANALYSIS OF SECURITY ASPECTS FOR DYNAMIC RESOURCE MANAGEMENT IN DISTRIBUTED S...
ANALYSIS OF SECURITY ASPECTS FOR DYNAMIC RESOURCE MANAGEMENT IN DISTRIBUTED S...ANALYSIS OF SECURITY ASPECTS FOR DYNAMIC RESOURCE MANAGEMENT IN DISTRIBUTED S...
ANALYSIS OF SECURITY ASPECTS FOR DYNAMIC RESOURCE MANAGEMENT IN DISTRIBUTED S...
ijcseit
 
ANALYSIS OF SECURITY ASPECTS FOR DYNAMIC RESOURCE MANAGEMENT IN DISTRIBUTED S...
ANALYSIS OF SECURITY ASPECTS FOR DYNAMIC RESOURCE MANAGEMENT IN DISTRIBUTED S...ANALYSIS OF SECURITY ASPECTS FOR DYNAMIC RESOURCE MANAGEMENT IN DISTRIBUTED S...
ANALYSIS OF SECURITY ASPECTS FOR DYNAMIC RESOURCE MANAGEMENT IN DISTRIBUTED S...
ijcseit
 
WEEK 3 ESSAY QUESTIONS Instructions Answer all questions .docx
WEEK 3 ESSAY QUESTIONS Instructions Answer all questions .docxWEEK 3 ESSAY QUESTIONS Instructions Answer all questions .docx
WEEK 3 ESSAY QUESTIONS Instructions Answer all questions .docx
cockekeshia
 
A Novel Filtering based Scheme for Privacy Preserving Data Mining
A Novel Filtering based Scheme for Privacy Preserving Data MiningA Novel Filtering based Scheme for Privacy Preserving Data Mining
A Novel Filtering based Scheme for Privacy Preserving Data Mining
IRJET Journal
 
enhanced secure multi keyword top k retrieval in cloud
enhanced secure multi keyword top k retrieval in cloudenhanced secure multi keyword top k retrieval in cloud
enhanced secure multi keyword top k retrieval in cloud
INFOGAIN PUBLICATION
 
Control Cloud Data Access Using Attribute-Based Encryption
Control Cloud Data Access Using Attribute-Based EncryptionControl Cloud Data Access Using Attribute-Based Encryption
Control Cloud Data Access Using Attribute-Based Encryption
paperpublications3
 
Paper id 28201425
Paper id 28201425Paper id 28201425
Paper id 28201425
IJRAT
 
Encryption technology
Encryption technologyEncryption technology
Encryption technology
Sivakumarraju Gangaraju
 
A New Method for Encrypting Digital Data Using Symmetric Key in Information E...
A New Method for Encrypting Digital Data Using Symmetric Key in Information E...A New Method for Encrypting Digital Data Using Symmetric Key in Information E...
A New Method for Encrypting Digital Data Using Symmetric Key in Information E...
Editor IJCATR
 

Similar to New Content for Section 4 Technical ControlsThis week will focus .docx (20)

File transfer with multiple security mechanism
File transfer with multiple security mechanismFile transfer with multiple security mechanism
File transfer with multiple security mechanism
 
Network security chapter 1
Network security   chapter 1Network security   chapter 1
Network security chapter 1
 
Data Security And The Security
Data Security And The SecurityData Security And The Security
Data Security And The Security
 
A SURVEY ON RECENT APPROACHES COMBINING CRYPTOGRAPHY AND STEGANOGRAPHY
A SURVEY ON RECENT APPROACHES COMBINING CRYPTOGRAPHY AND STEGANOGRAPHYA SURVEY ON RECENT APPROACHES COMBINING CRYPTOGRAPHY AND STEGANOGRAPHY
A SURVEY ON RECENT APPROACHES COMBINING CRYPTOGRAPHY AND STEGANOGRAPHY
 
SECURED FREQUENT ITEMSET DISCOVERY IN MULTI PARTY DATA ENVIRONMENT FREQUENT I...
SECURED FREQUENT ITEMSET DISCOVERY IN MULTI PARTY DATA ENVIRONMENT FREQUENT I...SECURED FREQUENT ITEMSET DISCOVERY IN MULTI PARTY DATA ENVIRONMENT FREQUENT I...
SECURED FREQUENT ITEMSET DISCOVERY IN MULTI PARTY DATA ENVIRONMENT FREQUENT I...
 
Solve Big Data Security Issues
Solve Big Data Security IssuesSolve Big Data Security Issues
Solve Big Data Security Issues
 
Data and database security and controls
Data and database security and controlsData and database security and controls
Data and database security and controls
 
A Personal Privacy Data Protection Scheme for Encryption and Revocation of Hi...
A Personal Privacy Data Protection Scheme for Encryption and Revocation of Hi...A Personal Privacy Data Protection Scheme for Encryption and Revocation of Hi...
A Personal Privacy Data Protection Scheme for Encryption and Revocation of Hi...
 
Data attribute security and privacy in Collaborative distributed database Pub...
Data attribute security and privacy in Collaborative distributed database Pub...Data attribute security and privacy in Collaborative distributed database Pub...
Data attribute security and privacy in Collaborative distributed database Pub...
 
A Secure & Scalable Access Method in Cloud Computing
A Secure & Scalable Access Method in Cloud ComputingA Secure & Scalable Access Method in Cloud Computing
A Secure & Scalable Access Method in Cloud Computing
 
Cryptography introduction
Cryptography introductionCryptography introduction
Cryptography introduction
 
ANALYSIS OF SECURITY ASPECTS FOR DYNAMIC RESOURCE MANAGEMENT IN DISTRIBUTED S...
ANALYSIS OF SECURITY ASPECTS FOR DYNAMIC RESOURCE MANAGEMENT IN DISTRIBUTED S...ANALYSIS OF SECURITY ASPECTS FOR DYNAMIC RESOURCE MANAGEMENT IN DISTRIBUTED S...
ANALYSIS OF SECURITY ASPECTS FOR DYNAMIC RESOURCE MANAGEMENT IN DISTRIBUTED S...
 
ANALYSIS OF SECURITY ASPECTS FOR DYNAMIC RESOURCE MANAGEMENT IN DISTRIBUTED S...
ANALYSIS OF SECURITY ASPECTS FOR DYNAMIC RESOURCE MANAGEMENT IN DISTRIBUTED S...ANALYSIS OF SECURITY ASPECTS FOR DYNAMIC RESOURCE MANAGEMENT IN DISTRIBUTED S...
ANALYSIS OF SECURITY ASPECTS FOR DYNAMIC RESOURCE MANAGEMENT IN DISTRIBUTED S...
 
WEEK 3 ESSAY QUESTIONS Instructions Answer all questions .docx
WEEK 3 ESSAY QUESTIONS Instructions Answer all questions .docxWEEK 3 ESSAY QUESTIONS Instructions Answer all questions .docx
WEEK 3 ESSAY QUESTIONS Instructions Answer all questions .docx
 
A Novel Filtering based Scheme for Privacy Preserving Data Mining
A Novel Filtering based Scheme for Privacy Preserving Data MiningA Novel Filtering based Scheme for Privacy Preserving Data Mining
A Novel Filtering based Scheme for Privacy Preserving Data Mining
 
enhanced secure multi keyword top k retrieval in cloud
enhanced secure multi keyword top k retrieval in cloudenhanced secure multi keyword top k retrieval in cloud
enhanced secure multi keyword top k retrieval in cloud
 
Control Cloud Data Access Using Attribute-Based Encryption
Control Cloud Data Access Using Attribute-Based EncryptionControl Cloud Data Access Using Attribute-Based Encryption
Control Cloud Data Access Using Attribute-Based Encryption
 
Paper id 28201425
Paper id 28201425Paper id 28201425
Paper id 28201425
 
Encryption technology
Encryption technologyEncryption technology
Encryption technology
 
A New Method for Encrypting Digital Data Using Symmetric Key in Information E...
A New Method for Encrypting Digital Data Using Symmetric Key in Information E...A New Method for Encrypting Digital Data Using Symmetric Key in Information E...
A New Method for Encrypting Digital Data Using Symmetric Key in Information E...
 

More from darwinming1

Not all countries have moved through all 4 phases of the demographic.docx
Not all countries have moved through all 4 phases of the demographic.docxNot all countries have moved through all 4 phases of the demographic.docx
Not all countries have moved through all 4 phases of the demographic.docx
darwinming1
 
NOTE I need just 150-200 words answer with 1-2 references in APA. M.docx
NOTE I need just 150-200 words answer with 1-2 references in APA. M.docxNOTE I need just 150-200 words answer with 1-2 references in APA. M.docx
NOTE I need just 150-200 words answer with 1-2 references in APA. M.docx
darwinming1
 
Note I need 2 pages paper addressing the provided details. Please.docx
Note I need 2 pages paper addressing the provided details. Please.docxNote I need 2 pages paper addressing the provided details. Please.docx
Note I need 2 pages paper addressing the provided details. Please.docx
darwinming1
 
Not-for-profit organizations are using social media to redefine how .docx
Not-for-profit organizations are using social media to redefine how .docxNot-for-profit organizations are using social media to redefine how .docx
Not-for-profit organizations are using social media to redefine how .docx
darwinming1
 
North, South and West Please respond to the following (Note Pl.docx
North, South and West Please respond to the following (Note Pl.docxNorth, South and West Please respond to the following (Note Pl.docx
North, South and West Please respond to the following (Note Pl.docx
darwinming1
 
North, South and West Please respond to the following (Note Plea.docx
North, South and West Please respond to the following (Note Plea.docxNorth, South and West Please respond to the following (Note Plea.docx
North, South and West Please respond to the following (Note Plea.docx
darwinming1
 
No unread replies.88 replies.Go to httpwww.eagles.orgvu-.docx
No unread replies.88 replies.Go to httpwww.eagles.orgvu-.docxNo unread replies.88 replies.Go to httpwww.eagles.orgvu-.docx
No unread replies.88 replies.Go to httpwww.eagles.orgvu-.docx
darwinming1
 
Not only are people born into a specific culture, they also are soci.docx
Not only are people born into a specific culture, they also are soci.docxNot only are people born into a specific culture, they also are soci.docx
Not only are people born into a specific culture, they also are soci.docx
darwinming1
 
NOTE I am very particular about my papers. Please do not respond if.docx
NOTE I am very particular about my papers. Please do not respond if.docxNOTE I am very particular about my papers. Please do not respond if.docx
NOTE I am very particular about my papers. Please do not respond if.docx
darwinming1
 
Note Be sure to review the examples and hints provided with e.docx
Note Be sure to review the examples and hints provided with e.docxNote Be sure to review the examples and hints provided with e.docx
Note Be sure to review the examples and hints provided with e.docx
darwinming1
 
NOTE A Power point presentation is also required along side this.docx
NOTE A Power point presentation is also required along side this.docxNOTE A Power point presentation is also required along side this.docx
NOTE A Power point presentation is also required along side this.docx
darwinming1
 
No plagiarismBetween 10 and 15 relevant academic journals with H.docx
No plagiarismBetween 10 and 15 relevant academic journals with H.docxNo plagiarismBetween 10 and 15 relevant academic journals with H.docx
No plagiarismBetween 10 and 15 relevant academic journals with H.docx
darwinming1
 
No plagirism , please I need this on time due 41715 no work cited .docx
No plagirism , please I need this on time due 41715 no work cited .docxNo plagirism , please I need this on time due 41715 no work cited .docx
No plagirism , please I need this on time due 41715 no work cited .docx
darwinming1
 
no need outside source expect for Durkheims on suicideFor the t.docx
no need outside source expect for Durkheims on suicideFor the t.docxno need outside source expect for Durkheims on suicideFor the t.docx
no need outside source expect for Durkheims on suicideFor the t.docx
darwinming1
 
No matter where I worked or what job I held, it was my interpersona.docx
No matter where I worked or what job I held, it was my interpersona.docxNo matter where I worked or what job I held, it was my interpersona.docx
No matter where I worked or what job I held, it was my interpersona.docx
darwinming1
 
no more than 1,250 words. A strategic plan for ESPN, including the f.docx
no more than 1,250 words. A strategic plan for ESPN, including the f.docxno more than 1,250 words. A strategic plan for ESPN, including the f.docx
no more than 1,250 words. A strategic plan for ESPN, including the f.docx
darwinming1
 
No other country in the world has a health care system like that of .docx
No other country in the world has a health care system like that of .docxNo other country in the world has a health care system like that of .docx
No other country in the world has a health care system like that of .docx
darwinming1
 
NO PLAGARISM IF YOU CANNOT DO ORIGINAL AND GOOD QUALITY WORK, THE.docx
NO PLAGARISM IF YOU CANNOT DO ORIGINAL AND GOOD QUALITY WORK, THE.docxNO PLAGARISM IF YOU CANNOT DO ORIGINAL AND GOOD QUALITY WORK, THE.docx
NO PLAGARISM IF YOU CANNOT DO ORIGINAL AND GOOD QUALITY WORK, THE.docx
darwinming1
 
New Opportunities in Community SettingsCommunity based nursing h.docx
New Opportunities in Community SettingsCommunity based nursing h.docxNew Opportunities in Community SettingsCommunity based nursing h.docx
New Opportunities in Community SettingsCommunity based nursing h.docx
darwinming1
 
Nine-year-old Wandas teacher notices that for the past few weeks, W.docx
Nine-year-old Wandas teacher notices that for the past few weeks, W.docxNine-year-old Wandas teacher notices that for the past few weeks, W.docx
Nine-year-old Wandas teacher notices that for the past few weeks, W.docx
darwinming1
 

More from darwinming1 (20)

Not all countries have moved through all 4 phases of the demographic.docx
Not all countries have moved through all 4 phases of the demographic.docxNot all countries have moved through all 4 phases of the demographic.docx
Not all countries have moved through all 4 phases of the demographic.docx
 
NOTE I need just 150-200 words answer with 1-2 references in APA. M.docx
NOTE I need just 150-200 words answer with 1-2 references in APA. M.docxNOTE I need just 150-200 words answer with 1-2 references in APA. M.docx
NOTE I need just 150-200 words answer with 1-2 references in APA. M.docx
 
Note I need 2 pages paper addressing the provided details. Please.docx
Note I need 2 pages paper addressing the provided details. Please.docxNote I need 2 pages paper addressing the provided details. Please.docx
Note I need 2 pages paper addressing the provided details. Please.docx
 
Not-for-profit organizations are using social media to redefine how .docx
Not-for-profit organizations are using social media to redefine how .docxNot-for-profit organizations are using social media to redefine how .docx
Not-for-profit organizations are using social media to redefine how .docx
 
North, South and West Please respond to the following (Note Pl.docx
North, South and West Please respond to the following (Note Pl.docxNorth, South and West Please respond to the following (Note Pl.docx
North, South and West Please respond to the following (Note Pl.docx
 
North, South and West Please respond to the following (Note Plea.docx
North, South and West Please respond to the following (Note Plea.docxNorth, South and West Please respond to the following (Note Plea.docx
North, South and West Please respond to the following (Note Plea.docx
 
No unread replies.88 replies.Go to httpwww.eagles.orgvu-.docx
No unread replies.88 replies.Go to httpwww.eagles.orgvu-.docxNo unread replies.88 replies.Go to httpwww.eagles.orgvu-.docx
No unread replies.88 replies.Go to httpwww.eagles.orgvu-.docx
 
Not only are people born into a specific culture, they also are soci.docx
Not only are people born into a specific culture, they also are soci.docxNot only are people born into a specific culture, they also are soci.docx
Not only are people born into a specific culture, they also are soci.docx
 
NOTE I am very particular about my papers. Please do not respond if.docx
NOTE I am very particular about my papers. Please do not respond if.docxNOTE I am very particular about my papers. Please do not respond if.docx
NOTE I am very particular about my papers. Please do not respond if.docx
 
Note Be sure to review the examples and hints provided with e.docx
Note Be sure to review the examples and hints provided with e.docxNote Be sure to review the examples and hints provided with e.docx
Note Be sure to review the examples and hints provided with e.docx
 
NOTE A Power point presentation is also required along side this.docx
NOTE A Power point presentation is also required along side this.docxNOTE A Power point presentation is also required along side this.docx
NOTE A Power point presentation is also required along side this.docx
 
No plagiarismBetween 10 and 15 relevant academic journals with H.docx
No plagiarismBetween 10 and 15 relevant academic journals with H.docxNo plagiarismBetween 10 and 15 relevant academic journals with H.docx
No plagiarismBetween 10 and 15 relevant academic journals with H.docx
 
No plagirism , please I need this on time due 41715 no work cited .docx
No plagirism , please I need this on time due 41715 no work cited .docxNo plagirism , please I need this on time due 41715 no work cited .docx
No plagirism , please I need this on time due 41715 no work cited .docx
 
no need outside source expect for Durkheims on suicideFor the t.docx
no need outside source expect for Durkheims on suicideFor the t.docxno need outside source expect for Durkheims on suicideFor the t.docx
no need outside source expect for Durkheims on suicideFor the t.docx
 
No matter where I worked or what job I held, it was my interpersona.docx
No matter where I worked or what job I held, it was my interpersona.docxNo matter where I worked or what job I held, it was my interpersona.docx
No matter where I worked or what job I held, it was my interpersona.docx
 
no more than 1,250 words. A strategic plan for ESPN, including the f.docx
no more than 1,250 words. A strategic plan for ESPN, including the f.docxno more than 1,250 words. A strategic plan for ESPN, including the f.docx
no more than 1,250 words. A strategic plan for ESPN, including the f.docx
 
No other country in the world has a health care system like that of .docx
No other country in the world has a health care system like that of .docxNo other country in the world has a health care system like that of .docx
No other country in the world has a health care system like that of .docx
 
NO PLAGARISM IF YOU CANNOT DO ORIGINAL AND GOOD QUALITY WORK, THE.docx
NO PLAGARISM IF YOU CANNOT DO ORIGINAL AND GOOD QUALITY WORK, THE.docxNO PLAGARISM IF YOU CANNOT DO ORIGINAL AND GOOD QUALITY WORK, THE.docx
NO PLAGARISM IF YOU CANNOT DO ORIGINAL AND GOOD QUALITY WORK, THE.docx
 
New Opportunities in Community SettingsCommunity based nursing h.docx
New Opportunities in Community SettingsCommunity based nursing h.docxNew Opportunities in Community SettingsCommunity based nursing h.docx
New Opportunities in Community SettingsCommunity based nursing h.docx
 
Nine-year-old Wandas teacher notices that for the past few weeks, W.docx
Nine-year-old Wandas teacher notices that for the past few weeks, W.docxNine-year-old Wandas teacher notices that for the past few weeks, W.docx
Nine-year-old Wandas teacher notices that for the past few weeks, W.docx
 

Recently uploaded

The French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free downloadThe French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free download
Vivekanand Anglo Vedic Academy
 
Honest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptxHonest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptx
timhan337
 
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
Nguyen Thanh Tu Collection
 
1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx
JosvitaDsouza2
 
Best Digital Marketing Institute In NOIDA
Best Digital Marketing Institute In NOIDABest Digital Marketing Institute In NOIDA
Best Digital Marketing Institute In NOIDA
deeptiverma2406
 
Synthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptxSynthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptx
Pavel ( NSTU)
 
Normal Labour/ Stages of Labour/ Mechanism of Labour
Normal Labour/ Stages of Labour/ Mechanism of LabourNormal Labour/ Stages of Labour/ Mechanism of Labour
Normal Labour/ Stages of Labour/ Mechanism of Labour
Wasim Ak
 
The Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official PublicationThe Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official Publication
Delapenabediema
 
Overview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with MechanismOverview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with Mechanism
DeeptiGupta154
 
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
EugeneSaldivar
 
Supporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptxSupporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptx
Jisc
 
STRAND 3 HYGIENIC PRACTICES.pptx GRADE 7 CBC
STRAND 3 HYGIENIC PRACTICES.pptx GRADE 7 CBCSTRAND 3 HYGIENIC PRACTICES.pptx GRADE 7 CBC
STRAND 3 HYGIENIC PRACTICES.pptx GRADE 7 CBC
kimdan468
 
Model Attribute Check Company Auto Property
Model Attribute  Check Company Auto PropertyModel Attribute  Check Company Auto Property
Model Attribute Check Company Auto Property
Celine George
 
Unit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdfUnit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdf
Thiyagu K
 
Introduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp NetworkIntroduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp Network
TechSoup
 
Group Presentation 2 Economics.Ariana Buscigliopptx
Group Presentation 2 Economics.Ariana BuscigliopptxGroup Presentation 2 Economics.Ariana Buscigliopptx
Group Presentation 2 Economics.Ariana Buscigliopptx
ArianaBusciglio
 
Chapter -12, Antibiotics (One Page Notes).pdf
Chapter -12, Antibiotics (One Page Notes).pdfChapter -12, Antibiotics (One Page Notes).pdf
Chapter -12, Antibiotics (One Page Notes).pdf
Kartik Tiwari
 
The approach at University of Liverpool.pptx
The approach at University of Liverpool.pptxThe approach at University of Liverpool.pptx
The approach at University of Liverpool.pptx
Jisc
 
2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...
Sandy Millin
 
Digital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and ResearchDigital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and Research
Vikramjit Singh
 

Recently uploaded (20)

The French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free downloadThe French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free download
 
Honest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptxHonest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptx
 
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
 
1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx
 
Best Digital Marketing Institute In NOIDA
Best Digital Marketing Institute In NOIDABest Digital Marketing Institute In NOIDA
Best Digital Marketing Institute In NOIDA
 
Synthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptxSynthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptx
 
Normal Labour/ Stages of Labour/ Mechanism of Labour
Normal Labour/ Stages of Labour/ Mechanism of LabourNormal Labour/ Stages of Labour/ Mechanism of Labour
Normal Labour/ Stages of Labour/ Mechanism of Labour
 
The Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official PublicationThe Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official Publication
 
Overview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with MechanismOverview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with Mechanism
 
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
 
Supporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptxSupporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptx
 
STRAND 3 HYGIENIC PRACTICES.pptx GRADE 7 CBC
STRAND 3 HYGIENIC PRACTICES.pptx GRADE 7 CBCSTRAND 3 HYGIENIC PRACTICES.pptx GRADE 7 CBC
STRAND 3 HYGIENIC PRACTICES.pptx GRADE 7 CBC
 
Model Attribute Check Company Auto Property
Model Attribute  Check Company Auto PropertyModel Attribute  Check Company Auto Property
Model Attribute Check Company Auto Property
 
Unit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdfUnit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdf
 
Introduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp NetworkIntroduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp Network
 
Group Presentation 2 Economics.Ariana Buscigliopptx
Group Presentation 2 Economics.Ariana BuscigliopptxGroup Presentation 2 Economics.Ariana Buscigliopptx
Group Presentation 2 Economics.Ariana Buscigliopptx
 
Chapter -12, Antibiotics (One Page Notes).pdf
Chapter -12, Antibiotics (One Page Notes).pdfChapter -12, Antibiotics (One Page Notes).pdf
Chapter -12, Antibiotics (One Page Notes).pdf
 
The approach at University of Liverpool.pptx
The approach at University of Liverpool.pptxThe approach at University of Liverpool.pptx
The approach at University of Liverpool.pptx
 
2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...
 
Digital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and ResearchDigital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and Research
 

New Content for Section 4 Technical ControlsThis week will focus .docx

  • 1. New Content for Section 4: Technical Controls This week will focus on using encryption to protect the organization's data. Describe the concept of encryption. Include a discussion about symmetric and asymmetric encryption. Provide a description of at least 2 different encryption algorithms. When looking at data with respect to a database environment, it should be viewed in 2 ways: the interaction (the transfer of data) and the storage (the database files). Take this opportunity to describe what is meant by data at rest and data in motion. How can encryption techniques be applied to these 2 concepts? When applying encryption to a system, the confidentiality and integrity of data is critical. Show how encryption can provide protection in these 2 areas. Describe the mechanisms that can be applied to messages (data in motion) so that the following can be provided: Confidentiality Integrity Authentication This information should be 2–3 pages of details added to your Data Security, Quality, and Integrity document.