In this discussion, we are going to focus on non-repudiation. Non-repudiation

 
In this discussion, we are going to focus on non-repudiation. Non-repudiation establishes accountability when two parties enter into a transaction. It provides assurance that parties can enter in an agreement independent of their locations. This requirement is the foundation of digital commerce.
Discuss at least three transactions that you have entered in during the last 5 years where non-repudiation was important

  1. Two of the main VPN encryption protocols are TLS/SSL and IPSEC. Both protoc

 
1. Two of the main VPN encryption protocols are TLS/SSL and IPSEC. Both protocols establish handshakes to exchange parameters which will be used to set up VPN connections. In this paper you will first describe the TLS/SSL VPN handshake followed by a the IPSEC handshake. Compare the two protocols and explain, according to you which one is better.
Analysis
0 – 40 points
41 – 90
Demonstrates a lack of understanding of the TLS/SSL and IPSEC protocols
Demonstrates an understanding of the TLS/SSL and IPSEC protocols
Writing Quality & Adherence to Format Guidelines
0-6 points
9-10 points
Paper shows a below average/poor writing style lacking in elements of appropriate standard English and following proper APA guidelines.
Paper is well written and clear using APA guidelines and standard English characterized by elements of a strong writing style.

  You must submit an Index by the end of Week 6. The Index will provide key word

 
You must submit an Index by the end of Week 6. The Index will provide key words that will help those looking for a specific topic. Please reference the link below to create your index.
A link from Microsoft that will show you step by step how to do these…
Index:
https://support.microsoft.com/en-us/office/create-and-update-an-index-cc502c71-a605-41fd-9a02-cda9d14bf073

  In the news we are constantly hearing about security breaches, invasion of per

 
In the news we are constantly hearing about security breaches, invasion of personal privacy, and the increasing prevalence of our digital footprint. The increased availability of digital information presents concerns and challenges of privacy, accuracy, intellectual property rights, security, and censorship. As a global citizen, you need to be aware of these issues and how they impact your life (CO6).
Your instructor will set-up two (2) conversation groups this week in which you will select one topic to discuss which interests you.
Conversation Group: Privacy

Privacy, as it relates to social media, video surveillance, drones, digital footprint or other topics as they relate to digital privacy.
How does the electronic environment impact one’s right to privacy?

Conversation Group: Security

Security, as it relates to social media, video surveillance, drones, digital footprint or other topics as they relate to digital privacy.
How does the electronic environment impact one’s personal security?

Using the Richard G. Trefry Library or another credible source, locate and read a quality article regarding digital privacy or security. Be sure to provide attribution for your source in the forum. As you are formulating your initial post consider the following questions:
What is the issue? Tell us about it as if we know nothing on the topic.
What are the pros and cons of the issue?
Why is the issue important?
How might the issue impact your life?
You are required to participate in one group, and are welcome to participate in the other. Once the conversation is flowing, participate substantively with your peers to teach from one another.

  Analyze techniques to effectively compose a major IT document after watching t

 
Analyze techniques to effectively compose a major IT document after watching the videos or by conducting research by addressing the questions below:
Video: How to format a book in MS Word (Part III: Front matter, back matter and section breaks): https://www.youtube.com/watch?v=R-5kJl5rN6E
Video – Front Matter, Body & End Matter in Technical Documents: https://study.com/academy/lesson/front-matter-body-end-matter-in-technical-documents.html(This is not a mandatory video you must watch; however, there is a special offer for 7 days usage–Try it first for 7 days. Special Offer!)
Explain the purpose of front matter in a technical document and provide examples.
Explain the items found in the body of a technical document.
Explain the purpose of back (end) matter in a technical document and provide examples.

 Considering that there are many security concerns surrounding wireless networks

 Considering that there are many security concerns surrounding wireless networks, and many tools are freely available, how does and administrator or even an individual user go about ensuring the security of their wireless network?  List a minimum of two methods/techniques, and explain the rationale for your decision?

  What citation style does your program of choice use? APA After researching

 
What citation style does your program of choice use? APA
After researching this citation style, what types of challenges will you face when using this citation style?
How does collecting other people’s research help when trying to synthesize information for your own academic endeavors (CO8)?
What are the ethical ramifications of not quoting, citing, or referencing other people’s research in your academic work (CO4)? 

  Part 2A: Major Events Documentation Scenario: You visit a retail establishment

 
Part 2A: Major Events Documentation
Scenario: You visit a retail establishment, shop around, and finally carry several products to one of the point of sale (POS) terminals visible around the store. You produce a credit card and the salesclerk processes the transaction, bags your goods, and hands you the receipt. On your way to the exit, a store employee asks to see your receipt and inspects the contents of the store bag. Document each of the major events just described and then describe the events in terms of the PCI compliance standard. Include this report in your assignment.
Part 2B: PCI Compliance
This part will cover PCI. Please refer to Figure B-1A in your responses.
Respond to and address the following:
Suppose HGA’s data server, depicted in Figure B-1, stored cardholder data in the private databases. What steps should be taken to protect that data in order to be PCI compliant?
HGA’s data server has network connectivity. Assuming that cardholder data is transmitted across these networks, describe how data should be protected in transmission.
Users are located at various sites connected to the HGA network. Suggest appropriate access controls to restrict unauthorized users from looking at cardholder data.
The PCI specification notes that all systems and network devices connected to a system that stores, transmits, or processes cardholder data is in scope and must comply with PCI specifications. To avoid having the whole network subject to PCI specifications, how would you partition the network to reduce the scope of compliance?
 Submit the usual double-spaced APA-styled report. At least four pages of material are expected beyond the title page, table of contents, abstract, and references page.