Below are a series of common applications for cybersecurity select 8 and prepare a response on each detailing three or more of the following aspects

  • Post category:Nursing
  • Reading time:2 mins read

Below are a series of common applications for cybersecurity select 8 and prepare a response on each detailing three or more of the following aspects

  •  What is the need for security for the application from the perspective of the user?
  •  The cryptographic methods used and why?
  • The specific algorithm(s) that are commonly used for this application and the general mathematical derivation for the algorithms
  • The known security of these algorithms including any known attacks, including an analysis of why the attack works
  • Any commercial products to enable users to use the necessary cryptography

Your response for each application should be around 250 words (excluding the citations) and no more than 300 words, written in whole sentences. Include at least 2 citations to justify your response to each. You may cite one of my slides or the textbook as one but please give the unit number and slide number or the book page number. Your total word count should be at least 3,000 words.

Your responses should be directed to other IT professionals but should not assume a detailed knowledge of cryptography and the acronyms used.

Application areas

  • Confidential Internet traffic such as healthcare information submitted from a monitoring device (IoT)
  • Confidential email communication in a legal environment to protect client-privilege
  • Steganography use by terrorists to organize an “event”
  • Legal document signing for a mortgage application
  • Multi-factor authentication for a university such as Marymount
  • Secure file transfer over the Internet for outsourced software development activities in India
  • Encrypting confidential files (data at rest) in a cloud environment
  • Highly classified communication in the national defense space
  • Payment cards where signatures are no longer required for small transactions
  • Home automation including security systems using a voice-activated hub
  • EHR data transmitted to a doctor’s officefrom the hospital for continued care
  • Communication between electric cars on a major highway
  • Confidential company data stored on a mobile phone
  • Mobile phone communication in a global context
  • Secure Wi-fi communication in a military environment
  • Blockchain