Premium Essay

Sec280 Week 3

In:

Submitted By jodyle2000
Words 667
Pages 3
Key to Security

SEC-280 61093
DeVry University

March 23, 2013

ABC Institute of Research requires a special need to secure their private information from rivals. We are currently partnering up with XYZ Inc. in a research project dealing with genetics. I have researched a wide variety of possible solutions for the company. I will describe a proper security solution for protecting our information using symmetric encryption, advantages of symmetric encryption, and disadvantages of symmetric encryption.
I will begin by giving a brief description of symmetric encryption. According to ("Description of symmetric," 2007), “A secret key, which can be a number, a word, or just a string of random letters, is applied to the text of a message to change the content in a particular way.” The symmetric encryption has been used for a long time to protect

Similar Documents

Premium Essay

Sec280

...SEC280 | Week 1 | Case study on Port scans & sweeps | | Jared's | 11/3/2012 | Brief description of what they are and are they dangerous to company! | To answer the main questions for the concerns of our network, NO. These items that have been heard about do not require immediate attention as they are considered normal. We are protected behind our firewall as well as if the employees do as asked at the end of their shift, we will have absolutely nothing to worry about. As more in likely that situation was handled when we brought the network online. Here is a brief rundown on your concerned areas: Ping Sweeps and Port Scans are the two most common network probes that serve as important clues in sensing invasions or intrusions that can harm any type of network. Network probes are not actual intrusions, although, they could be potential causes of actual intrusions. Port scans and ping sweeps can lead to an intrusion of companies’ network system, however, with today’s technological advancements, these activities can be detected and prevented. Ping Sweeps; Ping sweeps are a set of ICMP Echo packets that are sent out to network of computers, actually a range of IP addresses, to see if there are any responses. As an intruder sends out the ping sweeps, he looks for responses so he can figure out which machines he can attack. “Note that there are legitimate reasons for performing ping sweeps on a network—a network administrator may be trying to find out which...

Words: 1129 - Pages: 5