JNTU Business Continuity Plan Cryptography Confidential Data Discussion
Please write answers to the below questions in word document separately and add 2-3 clickable references at the end of the document
Sub : Ethical Hacking
A.Discussion:
Write not less than 300 words, Cryptography is used to protect confidential data in many areas. Choose one type of cryptography attack and briefly explain how it works (examples include: ciphertext-only attack, known-plain-test attack, chosen-plaintext, chosen-ciphertext attack, timing attack, rubber hose attack, adaptive attack).
B. Assignment:
Write not less than 300 words, Select one type of cryptography or encryption and explain it in detail. Include the benefits as well as the limitations of this type of encryption. Your summary should be 2-3 paragraphs in length
Write in essay format not in bulleted, numbered or another list format
.
2.Information Assurance:
DIscussion:
Write not less than 350 words, describe each of the elements of a Business Continuity Plan (BCP).