Assignment
Discuss and share your thoughts on the evolution of IEEE standards and issues that come with securing wireless/mobile devices and or data. You are welcome to discuss best practices and additional elements that help keep data secure discussed in chapters 10 and 11.
Must Reading:
• Jacobs - Chapter 10
• Jacobs - Chapter 11
Students will be able to:
• Demonstrate an understanding of the various uses of cryptology.
• Differentiate between asymmetric and symmetric encryption.
• Analyze organizational requirements for application systems.
• Evaluate organizational needs and provide solutions to secure software and applications.
Watch the youtube video "Understanding Basic Network Design"
Text Book: Engineering Information Security: The Application of Systems Engineering Concepts to Achieve Information Assurance by Stuart Jacobs, Second Edition.