Categories
Computer science

Data transfer faces many security challenges, and hence, any protocols have been

Swamped with your writing assignments? Take the weight off your shoulder!

Submit your assignment instructions

Data transfer faces many security challenges, and hence, any protocols have been introduced to protect data while at motion. In this phase, you will be required to analyze one of these protocols. You will choose one of the protocols from the below list: HTTPS SSH 802.11 PGP You will describe the purpose of your chosen protocol and research that protocol. You will then answer these questions in your submission: What are some of the attacks that can be carried on this protocol? What cryptographic algorithm is used in this protocol? Examine the algorithm used and explain its steps. What are similar competitors that achieve the same security goals? What software/systems use these protocols? Your paper should provide instructions on how to install and maintain these protocols. For HTTPS, you should provide instructions so that a web server can serve HTTPS pages. For SSH, you should provide instructions so an organization can provide SSH access to its machines. For PGP, you should provide instructions so an email system can utilize PGP. For 802.11, you should provide instructions so a company has a secure wireless network. Your submission should be at least 1200 words, and you should utilize at least 4 different credible references. Upload Instructions: Select the Submit Assignment button to the right. Click Choose File, located in the File Upload box. Navigate to your file location. Once the file is located, select it and then select the Open button. Click Submit Assignment to complete the upload process.

Swamped with your writing assignments? Take the weight off your shoulder!

Submit your assignment instructions

Leave a Reply