1. What is the difference between data transit protocols (e.g. TLS, SSL), and encryption algorithms/ciphers (e.g. AES)?
How does key length affect security and processing requirements of encryption algorithms? Why do cloud services providers continue to support simpler, shorter key length ciphers as seen in protocols such as TLS 1.0/1.1? 3 pages
M4
2. Write a short paper of 2-3 pages discussing the advantages of three common multi-factor authentication solutions (e.g. Duo, Yubi, Okta, RSA, Gemalto).
M5
3. Create a cloud cyber security incident plan for a video conferencing company incorporating the primary elements of an effective cloud security incident response plan, including roles, responsibilities, phases, and lifecycle. 3 pages
M4: Data Transit Protocols vs. Encryption Algorithms
1. Difference Between Data Transit Protocols and Encryption Algorithms:
-
Data Transit Protocols: Protocols like TLS (Transport Layer Security) and SSL (Secure Sockets Layer) establish secure connections between two parties (e.g., a client and server) over a network. They define the procedures for:
-
Authentication: Verifying the identities of the communicating parties.
-
Key Exchange: Securely exchanging encryption keys between the parties.
-
Data Encryption: Encrypting data transmitted over the connection.
-
-
Encryption Algorithms/Ciphers: Algorithms like AES (Advanced Encryption Standard) are mathematical functions that transform data into an unreadable format using a secret key. They define the specific method for:
-
Encryption: Transforming plaintext into ciphertext.
-
Decryption: Reversing the process to retrieve plaintext from ciphertext.
-
M4: Data Transit Protocols vs. Encryption Algorithms
1. Difference Between Data Transit Protocols and Encryption Algorithms:
-
Data Transit Protocols: Protocols like TLS (Transport Layer Security) and SSL (Secure Sockets Layer) establish secure connections between two parties (e.g., a client and server) over a network. They define the procedures for:
-
Authentication: Verifying the identities of the communicating parties.
-
Key Exchange: Securely exchanging encryption keys between the parties.
-
Data Encryption: Encrypting data transmitted over the connection.
-
-
Encryption Algorithms/Ciphers: Algorithms like AES (Advanced Encryption Standard) are mathematical functions that transform data into an unreadable format using a secret key. They define the specific method for:
-
Encryption: Transforming plaintext into ciphertext.
-
Decryption: Reversing the process to retrieve plaintext from ciphertext.
-