Homework.

Description


Unformatted Attachment Preview

Don't use plagiarized sources. Get Your Custom Assignment on
Homework.
From as Little as $13/Page

______________________________________________________________________
Project 8.1 part 1:
Using the Web or other resources, write a brief paper about RSA, its history, its methodology,
and where it is used. Students with a sufficient math background may choose to delve more
deeply into the RSA algorithm’s mathematical basis.
Case Study 8:
Complete the Case Study as directed on page 243. Read the Case Study. Jane Doe ultimately
selects a commercial implementation of RSA. Explain why you believe a commercial RSA was the
best choice or why it is not the best choice!
Jane Doe is responsible for selecting an encryption method that is suitable for her company,
which sells insurance. The data the company sends is sensitive but is not military or classified in
nature. Jane is looking at a variety of methods. She ultimately selects a commercial
implementation of RSA. Is this the best choice? Why or why not?
In one file
______________________________________________________________________________
______
Now that you have watched the “The Ultimate Anti-virus Tool Scan” video, find three articles/sources that
review the “VirusTotal” tool. Write a summary of each of the articles/sources. Discuss at least three (3)
pros and three (3) cons of this anti-virus software tool.
https://rmu.blackboard.com/webapps/blackboard/content/contentWrapper.jsp?content_i
d=_5012429_1&displayName=Linked+File&navItem=content&attachment=true&course
_id=_81400_1&tab_group=courses&href=https%3A%2F%2Fwww.youtube.com%2Fwat
ch%3Fv%3DqDunOHGVS7k
In one file
______________________________________________________________________
______________________________________________________________________
Case Study 9, p. 276
Complete the Case Study on page 276.
Review the Case Study.
Answer the following questions: (Explain your answers in detail applying the knowledge
you have gained; evaluate the appropriateness of Jane Smith’s security selections)
1. What other actions might you recommend to her?
2. Would you recommend a different firewall? Why or why not?
Jane Smith is responsible for security at the ABC Company. She has a moderate budget with which to
purchase security solutions. To date, she has installed a router-based firewall between the network and
the outside world. She also has a commercial virus scanner on every machine on the network. Consider
the following questions: What other actions might you recommend to her? Would you recommend a
different firewall? Why or why not?
In one file
___________________________________________________________________________________

Purchase answer to see full
attachment