Outcomes addressed in this activity:

Unit Outcomes:

  • Compare cipher principles.
  • Illustrate basic encryption methods.

Course Outcome:

Analyze symmetric and asymmetric cryptosystem fundamentals.

Purpose

In this assignment, you will examine the role that cryptography plays in achieving the first goal of information security: confidentiality.

Assignment Instructions

Using Credible Sources, Justify Your Answers to Questions

Answer the following 12 questions by selecting the one best answer for each. Cite your course texts, or other credible source, and provide a 50- to 100-word explanation of why you chose your answer for each question.

  1. Which of the following are considered confidentiality services?
    1. Encryption technologies
    2. Digital signatures
    3. RAID arrays
  2. Which service provided by a cryptosystem is most important for the military?
    1. Integrity
    2. Nonrepudiation
    3. Confidentiality
  3. What is the purpose of authentication in a cryptosystem?
    1. Verifying the user’s or system’s identity
    2. Ensuring that data has not been changed by an unauthorized user
    3. Ensuring that the data’s sender cannot deny having sent the data
  4. Which service provided by a cryptosystem turns information into unintelligible data?
    1. Authorization
    2. Integrity
    3. Confidentiality
  5. What is another term for cryptography strength?
    1. Work factor
    2. Public key
    3. Private key
  6. You have created a cryptographic key on your organization’s domain controller. What should you do next?
    1. Determine the length of the key.
    2. Determine the security framework.
    3. Determine the key management infrastructure.
  7. Which cipher is based on the clues of the physical factors, rather than the hardware or a software cryptosystem?
    1. A DES cipher
    2. A concealment cipher
    3. A transposition cipher
  8. Which cipher type replaces the original text in a message with a different text?
    1. Block cipher
    2. Stream cipher
    3. Substitution cipher
  9. Which statement is not true of cryptanalysis?
    1. It is used to test the strength of an algorithm.
    2. It is a tool used to develop a secure cryptosystem.
    3. It is used to forge coded signals that will be accepted as authentic.
    4. It is a process of attempting reverse engineering of a cryptosystem.
  10. Who is primarily responsible for the organization’s security program and risk management?
    1. Business and functional manager
    2. System owner
    3. Information security manager
  11. Who is primarily responsible for proper implementation of security requirements in their IT system?
    1. IT security practitioner
    2. System owner
    3. Information security manager
  12. Which of the following is an active agent?
    1. Vulnerability
    2. Threat
    3. Risk

Assignment Requirements

Answers contain enough information to adequately answer the questions and contain no spelling, grammar, or APA errors. For more information on APA style formatting, refer to the resources in the Academic Tools area of this course.

All papers are written by ENL (US, UK, AUSTRALIA) writers with vast experience in the field. We perform a quality assessment on all orders before submitting them.

Do you have an urgent order?  We have more than enough writers who will ensure that your order is delivered on time. 

We provide plagiarism reports for all our custom written papers. All papers are written from scratch.

24/7 Customer Support

Contact us anytime, any day, via any means if you need any help. You can use the Live Chat, email, or our provided phone number anytime.

We will not disclose the nature of our services or any information you provide to a third party.

Assignment Help Services
Money-Back Guarantee

Get your money back if your paper is not delivered on time or if your instructions are not followed.

We Guarantee the Best Grades
Assignment Help Services