Can’t do an assignment? Get it done by a trustworthy essay writing service
In at least 400 words, you will capture how well you understood the material presented in this module and how well you have assimilated the material into your own thinking, actions, and professional perspective. Your reaction should include the following:
What did you learn?
What resonated with you and why?
Did something change your thinking about anything?
Did you find new topics that you love or hate?
Did you learn something that added to your useful knowledge?
Did some topics change how you use or think of technology?
Did you learn anything surprising?
Since humanity could write, cryptography was created and used to keep secrets. People employed cryptography to protect military and battle plans, glaze formulas, recipes, and illicit romances. The methods varied and over time the complexity increased to where we are today with free public encryption. Different types of secure communications software provide differing levels of protection and services. Internet, email, files, wireless, web applications and TCP/IP are all secured with different yet similar protocols. It is important to be familiar with what should be used with what to write it into information security documents. For example, will your business use PGP for files and email or PKI? Should files at rest be protected or only files in transit? Remember, every layer of security adds protection but it also adds hassles for users and costs. Analyze what is necessary based on the business’s information security blueprint discussed in Chapter 4.
Everything before this discussed protecting electrons, the ones and zeros of the digital world, however, there are some threats that impact information security in the physical world. Physical theft, the air conditioning quitting, flooding, fire, loss of power, insects (they eat paper records and wire insulation), are just some of the physical threats to information security. As with digital protection measures, physical security measures should be part of the policy. Employees must be trained on their part, and response plans for breaches should be in place and exercised regularly.
Both cryptography and physical security need constant review and maintenance.
Can’t do an assignment? Get it done by a trustworthy essay writing service