Cryptography Best Practices and Resource Portfolio – Part A (due Week 4 – 210 points)
Step 1: Establish a target audience and scope for your presentation. Select a real, or hypothetical, business engaged in e-business and outline its central offerings and/or services. Next, outline the categories of information that may require cryptography applications. This will provide focus to your research. Optionally, you can also select an industry.
Step 2: Assume you are the Senior Director of Security for the organization identified in Step 1. You have been asked to provide an executive briefing to middle and upper management on the topic of cryptography and how it should be applied in this environment. Think about what is important and/or interesting to the management team.
Step 3: Develop your executive briefing. Assume one or two PowerPoint slides per topic. Below is a proposed topic outline for your briefing. Consider using about eight topics. Your briefing should last about 15 minutes, as if it were being presented live. You should also create a Word document (4–6 pages), which will expand upon the concepts in more detail than the PPT. You will be submitting two items to your Dropbox: the PowerPoint and the Word document.
2.Protection Through Cryptography
3.The Applications of Keys
4.Attacks on Encrypted Data and Keys
5.Data Encryption Standards
10.Using a Trusted Third Party
11.How Public-Key Cryptography Works
12.Comparing the Algorithms (RSA, DH, and ECDH )
14.Use of Digital Signatures
15.Digital Signatures and Non-Repudiation
16.Digital Signatures and Authentication