Category: Education

Digital Signature Properties

Abstract The purpose of this document is to explain specific properties that a digital signature should have. This document also provides an explanation of the differences between direct and arbitrated digital signatures. Lastly this document explains what a suppress-replay attack entail. This document is intended for anybody looking to gain a basic understanding or a …

Continue reading

Message Authentication

Abstract The purpose of this document is to define message authentication, as well as, to identify different types of attacks that message authentication was designed to protect against. This document is intended for anybody looking to gain a basic knowledge or understanding of message authentication. Content A Message Authentication Code (MAC) is a short piece …

Continue reading

Public-key Directory

a laptop computer sitting on a stage in front of a building

Abstract The purpose of this document is to explain the four key elements to a public-key directory. Also included in this document is an explanation of what a public-key certificate is. This document is intended for anybody looking to gain knowledge about public-keys and public-key certificates. Content When working with the public-key cryptography there is …

Continue reading

Public-key Cryptography

Abstract The purpose of this document is to provide a basic understanding of public-key cryptography. Also included within this document is a description of the basic components to the public-key cryptography system. This document is intended for anybody looking to gain a basic understanding or knowledge of public-key cryptography. Content When the Internet was first …

Continue reading

Data Encryption Standard and 3DES

Abstract The purpose of this document is to explain how Data Encryption Standard (DES) works and why 3 DES is now used. Also included within this document is an explanation of why the middle portion of 3DES is a decryption instead of an encryption. The last item talked about within this document is a nonce …

Continue reading

Link and End-to-End Encryption Techniques

Abstract The purpose of this document is to provide fundamental differences between link and end-to-end encryption techniques. Also included within this document is a description of traffic padding and what its fundamental purpose is. The last item that can be found within this document is a description of differences between a session key and a …

Continue reading

Encryption Techniques

[Abstract] The purpose of this document is to analyze cryptographic transposition techniques by showing a few examples of some different techniques. The next portion of this document is to provide an answer to the question ‚ÄúIs it possible to decrypt the message that was encrypted with a two-stage transposition technique with a different key?‚Äù The …

Continue reading

Business Continuity

[Abstract] The purpose of this document is to provide a basic knowledge of how having a business backup plan can maintain business continuity. Also included within this document are guidelines to maintain business continuity and an explanation of some consequences for not following the business continuity guidelines. [Content] When the September 11th attacks on the …

Continue reading

Choosing a Location for a Network Operations Center (NOC)

[Abstract] The purpose of this document is to provide a basic understanding of network operation centers by identifying three key factors to consider when choosing a location for a network operation center. Also included within this document are five areas of physical security to consider when constructing a network operation center. [Content] When considering constructing …

Continue reading

Hardening OS X

[Abstract] The purpose of this document is to provide a basic understanding of operating systems and vulnerabilities with hardening practices for ensuring Apple’s operating system OS X is secured. Also included within this document are methods for ensuring that a web server is secured. [Content] “Every Mac is secure right out of the box,” thanks …

Continue reading

Disposition of Sensitive Information

[Abstract] The purpose of this document is to provide a summary of the article entitled “Disposition Of Sensitive Automated Information” as the author understands this article. Also included within this document is an explanation of how disk encryption can help to protect the information on that disk in the event it was lost or stolen. …

Continue reading

Financial Institutions Handle Privacy

[Abstract] The purpose of this document is to analyze why many financial institutions assess privacy as a compliance issue as opposed to a risk management issue. Included within this document are two different current regulations to help consumers protect their privacy. Also included within this document is an example of the primary causes of network …

Continue reading

Atlanta Burger King Sign

Proof that the Atlanta city school system works! This is an actual picture of a Burger King in Atlanta.

Network Testing Programs

[Abstract] The purpose of this document is to explain different types of testing programs that can be used to identify network latency issues when planning a network upgrade. Also included within this document are naming conventions for networking devices and hosts. Lastly this document will outline and explain different types of equipment and their roles …

Continue reading

Routing Protocols

[Abstract] The purpose of this document is to explain different routing protocols by using them within a scenario of being charged to reconfigure a company‚Äôs network. In the past static routes have been used and, for the scenario, I would like to ease the configuration of routing information. I am concerned about processor utilization if …

Continue reading

Networking Protocols and Models

[Abstract] The purpose of this document is to explain different networking protocols and models by explaining what is needed to upgrade a network from a bus topology to a star topology. Also included within this document is information about a network design to allow for maximum users with maximum throughput for 100Mbps to the customer’s …

Continue reading

Network Design Scenario

                                                                                            [Scenario] Schaumburg Elementary is a four-year-old, single-level building with …

Continue reading

Competitive Intelligence and Information Systems

                                                               [Abstract] The purpose of this document is to compare ethical issues that may or may not exist with using an information system, which is …

Continue reading

Problem Solving Strategies and Management Decision-making

[Abstract] The purpose of this document is to identify and implement problem solving strategies and management decision-making. Also included within this document is the answer to the questions, ‚ÄúWhat impact would decision-making styles have on the design of information systems that support decision making in international businesses?‚Äù [Content] There are a few different decision making …

Continue reading

Untrained Personnel Developing Information System

[Abstract] The purpose of this document is to provide a basic knowledge of what types of problems an untrained user may face with trying to develop an information system. Also included within this document is information about different case tools and how these case tools can aid in reducing cycle time and increase quality. [Content] …

Continue reading

Business Ethics With Employees

[Abstract] The purpose of this document is intended to provide an answer to what ethical may arise based upon an employee devising a way to make their job better, if any at all. Also included within this document is a basic understanding of why it is important to share knowledge and information at the workplace. …

Continue reading

Online Auction Ethics

[Abstract] The purpose of this document is intended to provide an answer to what moral or ethical constraints should be placed upon users of online auctions, if any at all. [Content] When the question arises of what types of constraints should be put in place to prevent users of online auctions from putting immoral, unethical, …

Continue reading

Information System Controls

[Abstract] The purpose of this document is intended to look at a course registration system within a university and argue which controls should be inputted into that system to ensure the system is not being abused. Also included within this document is an argument for which controls should be put into place to ensure students …

Continue reading

Computer Literate Executives and Information Systems

[Abstract] The purpose of this document is to provide an argument to the question, ‚ÄúAs more computer- and information system-literate employees move into executive positions, will executive support systems be needed? Why or why not?‚Äù The second part of this document answers the questions, ‚ÄúWhat special knowledge, other than that found in a course catalog, …

Continue reading

University LAN

[Abstract] The purpose of this document is to provide an increased or basic knowledge of how a university with all aspects of their university connected via the local area network (LAN) would change the educational process. Also included in this document are some examples of how a student can access the school‚Äôs information system and …

Continue reading

Estimating Business Investment

[Abstract] The purpose of this document is to provide an increased or basic knowledge of how automating the business by using computers and applications has advantages and disadvantages. Also included within this document is a plan to estimate the return on investment for automating the business, as well as, a determination of automating the business …

Continue reading

Computers and Functions

[Abstract] The purpose of this document is to provide an increased or basic knowledge of a computer and what types of functions are necessary to be present in order for a piece of hardware to be considered a computer. [Content] A computer is a piece or multiple pieces of hardware that have the ability to …

Continue reading

Information Systems Within Business

[Abstract] The purpose of this document is to provide an increased or basic knowledge of businesses and types of employees within business. Also included within this document are types of information systems within a business. Finally a determination is made if the employee‚Äôs position could be replaced by an information system. [Content] Within many aspects …

Continue reading

E-Tail and Retail Stores

[Abstract] The purpose of this document is to provide an increased or basic knowledge and a comparison of online and retail stores. Also included in this document is a comparison of how buying a product online differs from buying a product from a retail store and which products are better suited to be sold online …

Continue reading

Information Systems and Users

[Abstract] The purpose of this document is to provide an increased or basic knowledge of how users interact with information systems by utilizing input and output devices, computer performance factors, network performance issues, and correlating them to the online virtual campus. [Content] When viewing the American Intercontinental University online virtual campus system as an information …

Continue reading

Advantages and Disadvantages of Network Topologies

Different network topologies have different advantages and disadvantages. A bus network topology is nice because it is simple and cheap, however it has its limitations. On a bus topology you are limited to the number of hosts you can place on a single bus. A ring topology can be beneficial because it provides redundancy, however …

Continue reading