Question: Symmetric key algorithms use the same cryptographic keys to encrypt and decrypt information. The keys are generally identical, as is the transformation process. This makes
Symmetric key algorithms use the same cryptographic keys to encrypt and decrypt information. The keys are generally identical, as is the transformation process. This makes the approach to encryption and decryption of information relatively simple and straightforward since two or more parties share the same secret key. This is also one of its inherent weaknesses since the same key is shared. The key could potentially be exposed or disclosed without the other party realizing itScenario: Youve been appointed as the information security officer at your organization. Your first assignment is to set up a secure communication channel between two geographically separated offices, providing a secure link for both teleconferencing and email. The teleconferencing system uses Voice over IP VoIP for communications and MS Outlook which uses standard protocolsExplain how you would complete the assignment, and answer the following questions:What recommendations would you make to secure the communications?What encryption methods or technologies would you propose?MS Outlook uses endtoend symmetric encryption. What are the advantages and disadvantages of using symmetric encryption?What are the strengths or weaknesses of your approach?Explain the process.
Step by Step Solution
There are 3 Steps involved in it
1 Expert Approved Answer
Step: 1 Unlock
Question Has Been Solved by an Expert!
Get step-by-step solutions from verified subject matter experts
Step: 2 Unlock
Step: 3 Unlock
