rst e-activity
Go to Computerworld’s Website and read “Researchers hack VeriSign’s SSL scheme for securing websites”, located at http://www.computerworld.com/s/article/9124558/Researchers_hack_VeriSign_s_SSL_scheme_for_securing_Web_sites. Be prepared to discuss.
Second e-activity
Download and read the PDF file, “Oracle Identity Management at Dartmouth College: A Case Study”, located at http://aptecllc.com/case-studies/oim11g/case-study-titile-goes-here-pdf. Be prepared to discuss. Note: If you experience difficulties viewing the PDF file, you may need to copy and paste the Web address into a browser for direct access to the file
From the first e-Activity, propose some best practices that could be used by businesses to ensure that digital certificates are not fake certificates.
Discuss the advantages and disadvantages of encrypting a disk. Explain whether you would use BitLocker to protect your data.
- From the second e-Activity, evaluate the decision Dartmouth made to implement the Oracle Identity Manager 11g in terms of administrative functions, cost, and ease of use. Determine whether Dartmouth’s requirements were reasonable and easy to implement. Explain why or why not.
- Compare and contrast your School identity management system (which students are required to use to access their classes, grades, course schedules, registration, etc.) to the Oracle Identity Manager 11g. Determine which one you prefer and explain why
Go to the SecurityFocus’ Website and read “MD5 Hack Interesting, But Not Threatening”, located at http://www.securityfocus.com/columnists/488.
- In 1996, the Message Digest 5 (MD5) hash algorithm used by protocols such as RADIUS (Remote Authentication Dial In User Service) to protect passwords was found to have a weakness that could subject it to collision attacks. In 2004, researchers showed that the practical ability for such an attack was very unlikely. Determine whether adopters of protocols that use MD5 should continue to use them. Explain why or why not.
- Suppose you work for a company that wants to implement a Virtual Private Networks (VPN) for telecommuters. Determine which tunneling protocol you would recommend and explain why
- Propose some best practices that businesses could apply to keep data in storage and data in transit secure. Select a best practice and provide a scenario where this would be the optimum practice to follow.
Use the order calculator below and get started! Contact our live support team for any assistance or inquiry.
[order_calculator]