Learning Objectives and Outcomes
- Understand the importance of information security
- Identify the controls or situations within the discussions.
- Explain the process Bob should use if he wants to send a confidential message to Alice using asymmetric cryptography.
- Explain the process Alice would use to decrypt the message Bob sent in question 1.
- Explain the process Bob should use to digitally sign a message to Alice.
Assignment Requirements
- Describe sensitive data.
- Identify the difference between EOL and EOS.
Struggling with where to start this assignment? Follow this guide to tackle your assignment easily!
Step-by-Step Guide to Structuring and Writing Your Paper
Step 1: Read the Assignment Like a Marker
Before writing anything, carefully review the learning objectives and assignment requirements. Each bullet point is something your paper must directly address. A strong paper clearly links answers back to these points.
👉 Tip: If a requirement isn’t answered, marks are likely lost—even if the writing is good.
Step 2: Plan Your Paper Structure
Use the following structure to stay organised and clear:
-
Introduction
-
Understanding Information Security & Sensitive Data
-
EOL vs EOS Explained
-
Asymmetric Cryptography: Sending & Receiving Messages
-
Digital Signatures Explained
-
Conclusion
This structure ensures your paper flows logically and covers every requirement.
Step 3: Write the Introduction
In 1–2 short paragraphs:
-
Introduce information security and why it matters
-
Briefly mention cryptography, sensitive data, and system lifecycle concepts (EOL/EOS)
-
State what the paper will cover
🎓 Tutor tip: Keep it general—details come later.
Step 4: Explain Information Security & Sensitive Data
In this section:
-
Define information security
-
Describe sensitive data (e.g., personal data, financial information, login credentials)
-
Explain why protecting sensitive data is critical
Link this discussion to real-world examples like data breaches or identity theft.
Step 5: Differentiate Between EOL and EOS
Clearly explain:
-
EOL (End of Life): When a product is no longer sold or developed
-
EOS (End of Support): When updates, patches, or security support stop
Explain why EOS systems are a security risk, especially for sensitive data.
✔ This directly satisfies an assignment requirement—be clear and precise.
Step 6: Explain Asymmetric Cryptography (Bob & Alice Scenario)
Break this into three mini-sections using simple language.
a. How Bob Sends a Confidential Message
-
Bob uses Alice’s public key to encrypt the message
-
Only Alice can decrypt it using her private key
b. How Alice Decrypts the Message
-
Alice receives the encrypted message
-
She uses her private key to decrypt and read it
Use step-by-step explanations rather than long paragraphs.
Step 7: Explain Digital Signatures
Describe:
-
How Bob creates a digital signature using his private key
-
How Alice verifies it using Bob’s public key
-
Why digital signatures ensure authenticity, integrity, and non-repudiation
🎓 Tutor tip: Make it clear this is not the same as encryption, even though both use asymmetric keys.
Step 8: Write a Strong Conclusion
Summarise:
-
The importance of information security
-
Protecting sensitive data
-
Secure communication using cryptography
-
Risks of outdated systems (EOL/EOS)
Avoid adding new information—just reinforce key points.
Step 9: Proofread Before Submission
Check for:
-
Clear headings
-
Simple explanations
-
Correct terminology
-
Grammar and spelling
If possible, read your paper out loud—it helps catch mistakes.
đź”— Recommended Academic Resources
You can safely reference these in your assignment:
-
NIST – Cryptography Overview
https://www.nist.gov/cryptography -
Cloudflare – What is Asymmetric Encryption?
https://www.cloudflare.com/learning/ssl/what-is-asymmetric-encryption/ -
IBM – What is Information Security?
https://www.ibm.com/topics/information-security -
Microsoft – End of Support Explained
https://learn.microsoft.com/en-us/lifecycle/end-of-support -
Kaspersky – What Is Sensitive Data?
https://www.kaspersky.com/resource-center/definitions/sensitive-data
Place this order or similar order and get an amazing discount. USE Discount code “GET20” for 20% discount