Writing Homework Help

HU Wk 3 Data Encryption Standard Cryptography Security & Forensics Discussion

 

  • Week 3 OverviewThe objective of this chapter is to illustrate the principles of modern symmetric ciphers. For this purpose, we focus on the most widely used symmetric cipher: the Data Encryption Standard (DES). Although numerous symmetric ciphers have been developed since the introduction of DES, and although it is destined to be replaced by the Advanced Encryption Standard (AES), DES remains the most important such algorithm. Furthermore, a detailed study of DES provides an understanding of the principles used in other symmetric ciphers.
  • Item

    Objectives

    ObjectivesBy the end of this week, you should be able to:

    1. Understand the difference between stream ciphers and block ciphers.
    2. Present an overview of Data Encryption Standard (DES).
    3. Discuss the cryptographic strength of DES.
  • Item

    Learning Materials

    Learning Materials Book Read Chapter 4 and 7
    Handout Chapter 4 PowerPoint Chapter 4 PowerPoint – Alternative Formats
    Chapter 7 PowerPoint Chapter 7 PowerPoint – Alternative Formats Headphones Week 3 recorded lecture

  • Item

    Course Link

  • linked itemWeek 3 Discussion Posting

    After reading chapter 4, evaluate the history of the Data Encryption Standard (DES) and then how it has transformed cryptography with the advancement of triple DES. The initial post must be completed by Thursday at 11:59 eastern. You are also required to post a response to a minimum of two other students in the class by the end of the week. You must use at least one scholarly resource. Every discussion posting must be properly APA formatted.

  • Assignment

    Milestone 1

    In the initial milestone writing assignment, you will evaluate the history of cryptography from its origins. Analyze how cryptography was used and describe how it grew within history. The writing assignment requires a minimum of two written pages to evaluate the history. You must use a minimum of three scholarly articles to omplete the assignment. The assignment must be properly APA formatted with a separate title and reference page.

  • Test

    Q uiz 2

    Your q uiz is timed. You have 10 minutes to complete. You only have one opportunity to c omplete the qu iz.

  • Week 2 Reading Assignments

    Week 2 Reading AssignmentsBook Title:Seeking the Truth from Mobile Evidence: Basic Fundamentals, Intermediate and Advanced Overview of Current Forensic InvestigationsAuthor: John BlairYear of Publication: 2018ISBN: 978-0-12-811056-0Chapters3 and 4

  • File

    Individual Project Assignment Instructions

    – Alternative Formats

  • Assignment

    Week 2 Individual Project

    Based on your reading, knowledge, and personal research, please answer the following according to the assignment instructions.

    1. What is Cell Phone Forensics?
    2. Explain logical and physical data
    3. What is Visual Validation, and why is it important?
    4. Explain the Faraday technique
    5. Explain consent to search as it relates to the legal process of cell phone forensics
    6. What is Target Llanguage as it relates to Device?
  • Discussion Board

    Week 2 Discussion Board

    Week 2 Discussion BoardFor this assignment, please discuss the following according to the instructions provided in the course syllabus.

    • How does the Fourth Amendment relate to the legal process of digital forensics?
    • How do exigent circumstances apply to the legal process?
    • Explain UFED, its purposes, and one of the primary reasons law enforcement will use this service.
    • Explain CDMA and GSM, their significance as it relates to the cellular network.