Company X has recruited a recent Harvard Computer Science graduate, Todd Johnsom, to improve its Information Security. Todd's proposal is to implement a new cutting-edge encryption algorithm that he recently developed. Todd claims this algorithm to be faster and more secure than TLS. How would you support this new security technology? Why or why not?
Before we are in a position to answer the question the key is to understand what TLS is and why it’s used industry wide.
TLS is a cryptographic protocol provided to secure end to end communications and transactions over networks. Many businesses rely on TLS for their daily running of operations because of its capability of securing communication where sensitive information is passed.
Currently we have TLS 1.3 in use, which was created in the wake of several attacks that have happened on TLS 1.2/SSL. Creating TLS 1.3 was the first major overhaul of the protocol as the Internet Engineering Task Force (IETF) set out to modernize it. Just to give a perspective of the amount of effort that was put in TLS 1.3 to make it safer, faster and more secure that the work on TLS1.3 started in April 2014 and it took four years and 28 drafts before it was approved in March of 2018.
Several key features on the new revised TLS 1.3 are
Now getting back into the question, the Company X should not support Todd new improved protocol in spite of the claims made by him. The following the list of reasons:
Company X has recruited a recent Harvard Computer Science graduate, Todd Johnsom, to improve its Information...
Risk management in Information Security today Everyday information security professionals are bombarded with marketing messages around risk and threat management, fostering an environment in which objectives seem clear: manage risk, manage threat, stop attacks, identify attackers. These objectives aren't wrong, but they are fundamentally misleading.In this session we'll examine the state of the information security industry in order to understand how the current climate fails to address the true needs of the business. We'll use those lessons as a foundation...
First, read the article on "The Delphi Method for Graduate Research." ------ Article is posted below Include each of the following in your answer (if applicable – explain in a paragraph) Research problem: what do you want to solve using Delphi? Sample: who will participate and why? (answer in 5 -10 sentences) Round one questionnaire: include 5 hypothetical questions you would like to ask Discuss: what are possible outcomes of the findings from your study? Hint: this is the conclusion....