Cryptography Best Practices and Resource Portfolio Solution
Cryptography Best Practices and Resource Portfolio – Part A (due Week 4 – 210 points)
Step 1: Establish a target audience and scope for your presentation. Select a real, or hypothetical, business engaged in e-business and outline its central offerings and/or services. Next, outline the categories of information that may require cryptography applications. This will provide focus to your research. Optionally, you can also select an industry.
Step 2: Assume you are the Senior Director of Security for the organization identified in Step 1. You have been asked to provide an executive briefing to middle and upper management on the topic of cryptography and how it should be applied in this environment. Think about what is important and/or interesting to the management team.
Step 3: Develop your executive briefing. Assume one or two PowerPoint slides per topic. Below is a proposed topic outline for your briefing. Consider using about eight topics. Your briefing should last about 15 minutes, as if it were being presented live. You should also create a Word document (4–6 pages), which will expand upon the concepts in more detail than the PPT. You will be submitting two items to your Dropbox: the PowerPoint and the Word document. 1.Feasible Attacks 2.Protection Through Cryptography 3.The Applications of Keys 4.Attacks on Encrypted Data and Keys 5.Data Encryption Standards 6.Password-Based Encryption 7.Good Passwords 8.Crypto Accelerators 9.Biometrics 10.Using a Trusted Third Party 11.How Public-Key Cryptography Works 12.Comparing the Algorithms (RSA, DH, and ECDH ) 13.Key Recovery 14.Use of Digital Signatures 15.Digital Signatures and Non-Repudiation 16.Digital Signatures and Authentication