Assignment:
Assignment Description
Watch the following LinkedIn Learning Videos to help you with the assignments in this Unit.
In a 5 to 6 page paper, provide the following content in the suggested format:
- Title page
- Introduction (12 paragraphs)
- Compare the differences between MAC and HMAC (1 to 2 pages)
- Explain why using HMAC is more secure than MAC (1 to 2 pages)
- Be prepared to fully support your argument.
- Give examples of commonly used MACs and HMACs. (1 to 2 pages)
- Conclusion (12 paragraphs)
- APA Reference List
The paper should be written using the APA writing style.
Please submit your assignment.
For assistance with your assignment, please use your text, Web resources, and all course materials.
Reading Assignment
- Ciampa, Part 3 (Cryptography), Module 6 (Basic Cryptography)
- Ciampa, Part 3 (Cryptography), Module 7 (Public Key Infrastructure and Cryptographic Protocols)
Assignment Objectives
- Explain cryptography, business continuity, and disaster recovery from a business perspective
- Explain the issues related to prevention, detection, and response
- Justify the preferred approach for handling an incident