Assignment:
DISCUSSION 1
Please respond to the following in a post of 150-200 words:
Distinguish among character, block, and stream ciphers.
Specify when to use each.
Note: Remember to cite any sources you use, including your textbook, using the Strayer Writing Standards format.
DISCUSSION 2
The three major types of malicious activities that organizations' information systems face include:
- Hostile or malicious insider activity.
- Theft of private, proprietary, or sensitive data, by insiders or external attackers.
- Large scale DoS (denial-of-service) attacks.
- Go to Strayer University Library to research one of these types of malicious activities.
Please respond to the following in a post of 150 to 200 words:
Based on your research:
- Describe a present-day example of your selected type of malicious activity and its impact on the organization.
- Specify the countermeasures the organization took to address the malicious activity.
- Recommend at least one additional preventative countermeasure and at least one countermeasure organizations could take to address this type of activity once it has occurred.
Provide a full citation and reference, formatted according to Strayer Writing Standards.
For assistance and information, please refer to the Strayer Writing Standards link in the left-hand menu of your course.