Pick an algorithm for any one of these types (e.g., DES, AES, RSA, MD5) and describe how it works and where it is applied in network security. (For example SSL uses 3DES or DES for message encryption.) Use your own words. When you pick an algorithm, try not to repeat.
Why do you need message authentication? Does encryption solve the problem of message authentication? Explain.
. All six methods of information gathering discussed in this week lecture take a lot of time. Do you think that there are some ways that systems analysts could collect the required information while saving time? Please offer your opinion on this issue.
During the systems development life cycle (SDLC), certain key problems discovered in the later stages could be directly traced back to inadequate and/or poor efforts in the requirements phase and industry studies show that over 50% of systems problems belong to this case. In addition, as mentioned in this week lecture notes “the cost of errors in requirements that weren’t discovered until later” may go up to 1,000 times. As a systems analyst, what should we do to minimize this problem? How might this be avoided?
For information-gathering techniques, there are interactive methods (interviewing, joint application design, and questionnaires) and unobtrusive methods (sampling, document analysis, and observation). As we all know that unobtrusive methods are less disruptive than interactive methods; however, when they are being used alone, they would gather insufficient information. Therefore, it is recommended that systems analysts should combine both interactive and unobtrusive methods during information gathering process. Please offer your opinion on this issue.