READING MATERIAL
Joseph Migga Kizza, Guide to Computer Network Security (4th Edition):
– Chapter 9: Access Control and Authorization
– Chapter 10: Authentication
– Chapter 11: Cryptography
ASSIGNMENT 1 – Hash Algorithms
Write a one-page paper double spaced that you can upload (e.g., Microsoft Word file). Precede the answer with the question.
Using the Web, research and write a brief summary of one of the standard hash algorithms (SHA-1, MD5, etc), and answer the following:
What are some of its strengths? Weaknesses?
What have been some applications in the field of Information Security?
What made you choose this particular hash algorithm?
Hint: choose one that you may know very little about to help you learn more about this critical piece of information security.
ASSIGNMENT 2 – E-commerce Authentication
Write a one-page paper to discuss the role of certificate authentication in e-commerce after reviewing this weeks reading material and videos. How have you personally experienced the need to verify the legitimacy of a certificate in your own online communications, ie, browsing to various websites?