1. What is the CIA Triad (define each component)? What is Defense-in-depth? In order to meet both criteria, what are the minimum-security requirements, as recommended by the United States government (list and describe at least 5)?
2. Differentiate between the DES, RSA, and Diffie-Hellman algorithms. What role does hashing play, and why is it important to Information Assurance?