2/3 Discussion

  1. Read Chapters 5–8 in your textbook.
  2. Using the discussion link below, respond to the following prompts and questions:
    1. Classify the types of cryptographic methods that are currently in use and describe their functionality.
    2. What function does PKI play in secure transactions? Discuss any issues with the use of PKI.
    3. Discuss why physical security is important. Select several physical security measures and provide reasoning for their implementation.
  3. Your initial post should be at least 300 words and supported with at least three references.

Tags: No tags