This Competency Assessment assesses the following outcome(s): IT279M2-2: Analyze symmetric and asymmetric
This Competency Assessment assesses the following outcome(s): IT279M2-2: Analyze symmetric and asymmetric cryptosystem fundamentals. Purpose In this Assessment, you will examine the role that cryptography plays in achieving the first goal of information security: Confidentiality. You will also examine several varieties of symmetric cryptography and one example of asymmetric cryptography. Instructions Part 1: Cryptography Fundamentals I Section … Read more