SAINT COM520 MODULE 3 AND 4 DISCUSSION
Question # 00065269
Posted By:
Updated on: 04/27/2015 05:22 AM Due on: 05/12/2015

module 3
Pick any one cryptographic protocol (e.g., SSL, TLS, IKE, Kerberos, SSH, PPTP, WEP, WPA, TKIP etc.). In your initial discussion post, please explain the working and details of the protocol clearly (no copy+paste). Wikipedia is not acceptable. When responding to someone’s post, please provide any missing details of the protocol that was explained, with particular emphasis on attacks/limitations of the protocol. |
mod 4
Assume you are all working as the security team in the IT department of a company. The upper-level management is considering the use of an effective approach to back up their systems. From magnetic tapes, CDs, to external hard drives and cloud-based services, there are technological solutions to this. In addition to the technologies, there are other issues to consider such as an effective disaster recovery plan. Using the concepts learned in this module and possibly with the help of online research, post something about a strategy, tool, or issue related to this that can aid the company in coming up with the best backup strategy.' |

-
Rating:
5/
Solution: SAINT COM520 MODULE 3 AND 4 DISCUSSION