WEEK 3 ESSAY QUESTIONS Instructions: Answer all questions in a single document. Then submit to the appropriate assignment folder. Each response to a single essay question should be about a half-page in length (about 150 words). 1. Cryptographic algorithms provide the underlying tools to most security protocols used in today’s infrastructures. The choice of which type of algorithm depends on the goal that you are trying to accomplish, such as encryption or data integrity. These algorithms fall into two main categories: symmetric key and asymmetric key cryptography. In this essay, please discuss the strengths and weaknesses of symmetric key cryptography and give an example of where this type of cryptography is used. Then discuss the strengths and weaknesses of asymmetric key cryptography and give an example of where this type of cryptography is used. 2. Cryptography has been used in one form or another for over 4000 years and attacks on cryptography have been occurring since its inception. The type of people attempting to break the code could be malicious in their intent or could just be trying to identify weaknesses in the security so that improvements can be made. In your essay response, define cryptanalysis and describe some of the common cryptanalytic techniques used in attacks. 3. Many people overlook the importance of physical security when addressing security concerns of the organization. Complex cryptography methods, stringent access control lists, and vigilant intrusion detection/prevention software will be rendered useless if an attacker gains physical access to your data center. Site and facility security planning is equally important to the technical controls that you implement when minimizing the access a criminal will have to your assets. In your essay response, define CPTED and describe how following the CPTED discipline can provide a more aesthetic alternative to classic target hardening approaches. Make sure that the three CPTED strategies are covered in your response

    Cryptography

    Symmetric clew cryptography is a create encryption that rights a homogeneous clew in encrypting and decrypting grounds stance in denseware. The special clews in the cryptography are dense to chip thus minimizing instances of onsets on the systems. Symmetric clews demand minimal computing capacity future nature accelerated and tolerate encrypting of vast amounts of instruction. The cryptography is unconfirmed in dispensation as a homogeneous clew is rightd coercion decrypting and encrypting entailing that eminent-safety mechanism are needed (Cozens 2005). The symmetric clews produce poor safety consequently they are applied to singly couple rulees. The clews scalability is unconfirmed due to growth in clews save firm reckon of rightrs

    Asymmetric clew cryptography entails the right of refractory clews to encrypt and decrypt grounds coercion stance in electronic despatch. The asymmetric clew is helpful by providing a disconnection to clew dispensation examples and detecting if grounds is tampered with. There are longer clews rightd in the encryption coercion aggravate grounds safety through evidence.  The cryptography is very slack making it dishonorable discurrent nation. The clews are unconstrained to chip, and the grounds faces the waste of an onset.

    Cryptpartition

    Cryptpartition is commsingly referred to as the consider of cryptosystems and molehills with the incline of finding issues that set-down the grounds at waste. Cryptpartition embraces the resurvey and partition of the molehill by nation gain choleric intentions of hacking instruction. The cryptanalytic techniques applied by hackers to avenue grounds embrace disclosed-plaintext which illustrates that a molehilltext has been succeeded and the associated plaintext is disclosed future the clew rightd can be extraneous (Li 2011). The molehilltext-singly technique which works through considerate guesses of the wording of a communication or the molehilltext consequently the plaintext is referable disclosed.

    The man-in-the-middle order is rightd by hackers to wile a clew possessor into giving extinguished their clew. The onseter or cryptanalyst communicates with a clew possessor as a individual zealous in exchanging clews coercion safety remedy purposes. Timing capacity rule facilitates the gathering of instruction on clew computations from electrical expenditure aggravate a time. The chosen-plaintext tactic helps cryptanalysts to succeed molehilltext from the plaintext and compares the couple to attain a clew.

    CPTED

    The offense impedeion through environmental contrivance is a philosophy that produces principles which bar offenses. CPTED inclines at influencing an malefactor judgment to execute a offense by fearful them from winning in the ordinary activities. The principles improve consume wary consequently onsets are referable accustomed when a flagitious is deterred at an future stage. A causative right of the serviceable distance is achieved concurrently with reducing the inhospitableness to offense, growths example solving, and improves functions parallel with the characteristic of spirit.

    CPTED incorporates strategies such as unless surveillance by maintaining eminent lighting in areas concurrently with CCTV camera coercion not attributable attributableice of activities initiative situate. The strategy eliminates immanent hiding disfigurement areas and encourages the right of windows that do referable impede images to discountenance flagitiouss (Rodrigues 2007). The unless avenue repress denies the malefactors’ repress of agency by channeling nation into a defined area. The strategy such as the right of a difficulty and landscaping bars frequented avenue to a target. Territorial donation distinguishes betwixt the special and generally-known characteristic to propose fair avenue which limits onseters from avenueing areas withextinguished authorization. Maintenance is a probing component implemented in territorial living to transmit a communication to onseters that anything immateriality is nature monitored.

    References

    Cozens, P. M., Saville, G., & Hillier, D. (2005). Offense impedeion through environmental contrivance (CPTED): a resurvey and novel bibliography. Characteristic superintendence, 23(5), 328-356.

    Li, X., Niu, J. W., Ma, J., Wang, W. D., & Liu, C. L. (2011). Cryptpartition and amendment of a biometrics-based distant rightr evidence plot using ready cards. Journal of Network and Computer Applications, 34(1), 73-79.

    Rodríguez-Henríquez, F., Saqib, N. A., Perez, A. D., & Koc, C. K. (2007). Cryptographic algorithms on reconfigurable denseware. Springer Science & Business Media.