Assignment
Topic: Discuss the elements of a security system design and provide practical examples in your paper
• IA Detection & Recovery Processes: IA Monitoring Tools & Methods, IA Measurement & Metrics, Incident Handling, Computer Forensics, Business Continuity Management, Backup & Restoration
Lesson Overview
You will learn about cryptography and the many methods that are used to keep data and transmissions secure. There are various methods and means to ensure data integrity and that all aspects of your data remains in tact.
Students will be able to:
• Demonstrate an understanding of the various uses of cryptology.
• Differentiate between asymmetric and symmetric encryption.
• Analyze organizational requirements for application systems.
• Evaluate organizational needs and provide solutions to secure software and applications.
In this lesson, we will discuss:
• The role of the certificate authority and authentication.
Key Learning Concept 1
• Encryption
• PKI
Key Learning Concept 2
• Access Control
• Software Security
The following activities and assessments need to be completed this week:
o Reading:
- Jacobs - Chapter 10
- Jacobs - Chapter 11
Text Book: Engineering Information Security: The Application of Systems Engineering Concepts to Achieve Information Assurance by Stuart Jacobs, Second Edition.