All parts need to be done

1 answer below »
All parts need to be done


Cryptography Part 1: Develop a presentation of 10-12 slides on the history of cryptography and provide examples of a substitution cipher, transposition cipher, and steganography. Explain how each cipher works, explain the function of a one-time pad and how frequency analysis is used as part of cryptanalysis. In addition to the 10-12 slides, include a cover slide and a citation slide. Part 2  Imagine that you have been asked to develop a PowerPoint presentation that will serve as a quiz bank for someone preparing for the CISSP certification exam (click here for information on that exam). Select 3 symmetric and 5 asymmetric algorithms and develop 2 quiz questions for each algorithm with the quiz question on one slide and the correct answer on the next slide. Create a diagram that shows how each algorithm works as part of the answer slide. Your final presentation should have a total of 18 slides: · 1 Cover slide · 16 quiz question/answer slides (2 slides per quiz question) · 1 Citation slide Part 3 As a future information security manager, you know it is important to provide for the proper verification of identity when communicating online. Research the components of public key infrastructure to include the use of private and public keys, digital certificates, certificates of authority, secure socket layer, and transport layer security methods. These methods are used to safeguard and validate the authenticity of an individual’s online identity when communicating across a network. Create a 3-page MS Word document that explains each of these concepts and provide illustrations/diagrams to support your explanations. Your paper should also include a cover page and a citation page for a total of 5 pages. Part4  Develop a 12 slide PowerPoint presentation that will explain the properties of digital signatures, the difference between direct and arbitrated digital signatures, explain a suppress replay attack, and advantages and disadvantages of using digital signatures. Please include diagrams and examples. Be sure to include a cover slide and citation slide in addition to the 12 main slides. Part 5 Imagine that you have been asked to write a blog article on the future of cryptography. Develop a 3-page MS Word document that explains how encryption is used to secure data in motion and data at rest. Recommend an encryption product and key strength for encrypting data stored on a computer hard drive (data at rest) and for data sent across the internet (data in motion). Explain the concept of quantum encryption and the risk of disruption it may have to modern cryptosystems. Explain the dark web and how TOR works. Your cover page and citation page add to the 3-page requirement for a total of 5 pages.
Answered 4 days AfterMay 09, 2022

Answer To: All parts need to be done

Dr Raghunandan G answered on May 14 2022
88 Votes
SOLUTION.PDF

Answer To This Question Is Available To Download

Related Questions & Answers

More Questions »

Submit New Assignment

Copy and Paste Your Assignment Here