Instructions
Cryptography is a key component of cybersecurity. Encryption supports cybersecurity by concealing data to prevent unauthorized access.
In your journal, write about the foundational components of encryption and concepts of plain and cipher text. Explain what a secret key is, and describe how many of these symmetric keys are used in encryption. Then compare and contrast symmetric and asymmetric encryption.
Your journal entry should be at least two paragraphs long.
__
Overview
Journals are private and between you and the instructor only. Approach these activities as an opportunity to reflect upon and apply what you learn each week based on the assigned readings, discussions, and activities. As a successful professional, you will need good reflective and writing skills. Journal activities offer you the opportunity to develop these skills further. The journal entries in this course are graded separately.
Prompt
First, complete the assigned readings for the week. Then read the journal prompt and write a reflection. Your journal entry should be two paragraphs long and address the prompt provided in each module.
In your response, be certain to address the following critical elements:
Critical Thinking and Reflection: Support the claims with relevant examples of previous and logical thought processes.
Integration and Application: Show excellent depth of knowledge of the module content and exhibit careful consideration of the topic.
Voice: Write in a style that is appealing and appropriate for the intended audience and use a consistent voice that is evident throughout.
What to Submit
Submit journal assignments as Word documents with double spacing, 12-point Times New Roman font, and one-inch margins. Responses should be at least two paragraphs long and address the points indicated in the journal prompt for each module.
Additional Resource: https://attack.mitre.org/
Place this order or similar order and get an amazing discount. USE Discount code “GET20” for 20% discount