SlideShare a Scribd company logo
1 of 1
During this time when the Internet provides essential
communication between literally billions of people and is used
as a tool for commerce, social interaction, and the exchange of
an increasing amount of personal information, security has
become a tremendously important issue for every user to deal
with.
There are many aspects to security and many applications,
ranging from secure commerce and payments to private
communications and protecting health care information. One
essential aspect for secure communications is that of
cryptography. But it is important to note that while
cryptography is necessary for secure communications, it is not
by itself sufficient.
In your initial discussion post, please
describe the hashing security mechanism
and how it is different from the encryption mechanism.
Respond substantively to at least two other students' posts. In
your peer responses, please discuss
how these mechanisms work to provide password security
in today's organizations. Can they be used together?

More Related Content

More from tawnan2hsurra

Read the information and the questions that follow. Identify the leg.docx
Read the information and the questions that follow. Identify the leg.docxRead the information and the questions that follow. Identify the leg.docx
Read the information and the questions that follow. Identify the leg.docx
tawnan2hsurra
 
Read the following case studies in order to complete the Week .docx
Read the following case studies in order to complete the Week .docxRead the following case studies in order to complete the Week .docx
Read the following case studies in order to complete the Week .docx
tawnan2hsurra
 
Read the following scenario and analyze how this situation should be.docx
Read the following scenario and analyze how this situation should be.docxRead the following scenario and analyze how this situation should be.docx
Read the following scenario and analyze how this situation should be.docx
tawnan2hsurra
 
Read the following and then answer the questions at the bottom.docx
Read the following and then answer the questions at the bottom.docxRead the following and then answer the questions at the bottom.docx
Read the following and then answer the questions at the bottom.docx
tawnan2hsurra
 
Read the complete description of the Oral History Interview Final Pa.docx
Read the complete description of the Oral History Interview Final Pa.docxRead the complete description of the Oral History Interview Final Pa.docx
Read the complete description of the Oral History Interview Final Pa.docx
tawnan2hsurra
 
Read the following case study and answer the reflective question.docx
Read the following case study and answer the reflective question.docxRead the following case study and answer the reflective question.docx
Read the following case study and answer the reflective question.docx
tawnan2hsurra
 
Read one of the articles listed below based on the topic of research.docx
Read one of the articles listed below based on the topic of research.docxRead one of the articles listed below based on the topic of research.docx
Read one of the articles listed below based on the topic of research.docx
tawnan2hsurra
 
Read Kristof’s Saudi’s in Bikinis” (272) then answer these follow.docx
Read Kristof’s Saudi’s in Bikinis” (272) then answer these follow.docxRead Kristof’s Saudi’s in Bikinis” (272) then answer these follow.docx
Read Kristof’s Saudi’s in Bikinis” (272) then answer these follow.docx
tawnan2hsurra
 
Read Case Problem 10-16 on page 283 of your text, and the two relate.docx
Read Case Problem 10-16 on page 283 of your text, and the two relate.docxRead Case Problem 10-16 on page 283 of your text, and the two relate.docx
Read Case Problem 10-16 on page 283 of your text, and the two relate.docx
tawnan2hsurra
 

More from tawnan2hsurra (20)

Read the information and the questions that follow. Identify the leg.docx
Read the information and the questions that follow. Identify the leg.docxRead the information and the questions that follow. Identify the leg.docx
Read the information and the questions that follow. Identify the leg.docx
 
Read the following case studies in order to complete the Week .docx
Read the following case studies in order to complete the Week .docxRead the following case studies in order to complete the Week .docx
Read the following case studies in order to complete the Week .docx
 
Read the Declaration of Independence and the Constitution of the Uni.docx
Read the Declaration of Independence and the Constitution of the Uni.docxRead the Declaration of Independence and the Constitution of the Uni.docx
Read the Declaration of Independence and the Constitution of the Uni.docx
 
Read the following scenario and analyze how this situation should be.docx
Read the following scenario and analyze how this situation should be.docxRead the following scenario and analyze how this situation should be.docx
Read the following scenario and analyze how this situation should be.docx
 
Read the following and then answer the questions at the bottom.docx
Read the following and then answer the questions at the bottom.docxRead the following and then answer the questions at the bottom.docx
Read the following and then answer the questions at the bottom.docx
 
Read the complete description of the Oral History Interview Final Pa.docx
Read the complete description of the Oral History Interview Final Pa.docxRead the complete description of the Oral History Interview Final Pa.docx
Read the complete description of the Oral History Interview Final Pa.docx
 
Read The Fashion Punk Paradox and answer the following questions.docx
Read The Fashion Punk Paradox and answer the following questions.docxRead The Fashion Punk Paradox and answer the following questions.docx
Read The Fashion Punk Paradox and answer the following questions.docx
 
Read the following case study and answer the reflective question.docx
Read the following case study and answer the reflective question.docxRead the following case study and answer the reflective question.docx
Read the following case study and answer the reflective question.docx
 
Read the book HarvardBusinessReview onDoing.docx
Read the book HarvardBusinessReview onDoing.docxRead the book HarvardBusinessReview onDoing.docx
Read the book HarvardBusinessReview onDoing.docx
 
Read the Case Study Commonwealth v Pullis (Philadelphia Cordwain.docx
Read the Case Study Commonwealth v Pullis (Philadelphia Cordwain.docxRead the Case Study Commonwealth v Pullis (Philadelphia Cordwain.docx
Read the Case Study Commonwealth v Pullis (Philadelphia Cordwain.docx
 
read the attachment carfully and the most important thingCompo.docx
read the attachment carfully and the most important thingCompo.docxread the attachment carfully and the most important thingCompo.docx
read the attachment carfully and the most important thingCompo.docx
 
Read the article titled The Perils and Pitfalls of Leading Change.docx
Read the article titled The Perils and Pitfalls of Leading Change.docxRead the article titled The Perils and Pitfalls of Leading Change.docx
Read the article titled The Perils and Pitfalls of Leading Change.docx
 
Read the article Factory Girls. (cover story). (2014). Scho.docx
Read the article Factory Girls. (cover story). (2014). Scho.docxRead the article Factory Girls. (cover story). (2014). Scho.docx
Read the article Factory Girls. (cover story). (2014). Scho.docx
 
Read the Article by Eugenia Georgaca entitled Talk and the Nature o.docx
Read the Article by Eugenia Georgaca entitled Talk and the Nature o.docxRead the Article by Eugenia Georgaca entitled Talk and the Nature o.docx
Read the Article by Eugenia Georgaca entitled Talk and the Nature o.docx
 
Read Philippians 219–24. Paul observed that most believers are to.docx
Read Philippians 219–24. Paul observed that most believers are to.docxRead Philippians 219–24. Paul observed that most believers are to.docx
Read Philippians 219–24. Paul observed that most believers are to.docx
 
Read Reforming Reform Understanding the Past and Securing the Fut.docx
Read Reforming Reform Understanding the Past and Securing the Fut.docxRead Reforming Reform Understanding the Past and Securing the Fut.docx
Read Reforming Reform Understanding the Past and Securing the Fut.docx
 
Read one of the articles listed below based on the topic of research.docx
Read one of the articles listed below based on the topic of research.docxRead one of the articles listed below based on the topic of research.docx
Read one of the articles listed below based on the topic of research.docx
 
Read the article and Provide a brief summary of it discussing the fo.docx
Read the article and Provide a brief summary of it discussing the fo.docxRead the article and Provide a brief summary of it discussing the fo.docx
Read the article and Provide a brief summary of it discussing the fo.docx
 
Read Kristof’s Saudi’s in Bikinis” (272) then answer these follow.docx
Read Kristof’s Saudi’s in Bikinis” (272) then answer these follow.docxRead Kristof’s Saudi’s in Bikinis” (272) then answer these follow.docx
Read Kristof’s Saudi’s in Bikinis” (272) then answer these follow.docx
 
Read Case Problem 10-16 on page 283 of your text, and the two relate.docx
Read Case Problem 10-16 on page 283 of your text, and the two relate.docxRead Case Problem 10-16 on page 283 of your text, and the two relate.docx
Read Case Problem 10-16 on page 283 of your text, and the two relate.docx
 

During this time when the Internet provides essential communicat

  • 1. During this time when the Internet provides essential communication between literally billions of people and is used as a tool for commerce, social interaction, and the exchange of an increasing amount of personal information, security has become a tremendously important issue for every user to deal with. There are many aspects to security and many applications, ranging from secure commerce and payments to private communications and protecting health care information. One essential aspect for secure communications is that of cryptography. But it is important to note that while cryptography is necessary for secure communications, it is not by itself sufficient. In your initial discussion post, please describe the hashing security mechanism and how it is different from the encryption mechanism. Respond substantively to at least two other students' posts. In your peer responses, please discuss how these mechanisms work to provide password security in today's organizations. Can they be used together?