1)Ethical Hacking
a) Cryptography is used to protect confidential data in many areas. Chose one type of cryptography attack and briefly explain how it works (examples include: ciphertext-only attack, known-plain-test attack, chosen-plaintext, chosen-ciphertext attack, timing attack, rubber hose attack, adaptive attack).
b) Select one type of cryptography or encryption and explain it in detail. Include the benefits as well as the limitations of this type of encryption. Your summary should be 2-3 paragraphs in length and uploaded as a TEXT DOCUMENT. Click the link above to submit your work. What is most important is that you use YOUR OWN WORDS to summarize the news article. It is essential that you do not copy text directly from the Internet. Plagiarism is unacceptable. You can easily avoid this by rephrasing the contents and summarizing it using your own words.
2) Information Assurance : Describe each of the elements of a Business Continuity Plan (BCP).An initial post must be between 250-300 words
Ethical hacking
Cryptography is a method of protecting information and communications through the use of codes, so that only those for whom the information is intended can read and process it. In cryptography, a ciphertext-only attack (COA) is an attack model for cryptanalysis where the attacker is assumed to have access only to a set of ciphertexts. He has no idea what the plaintext data or the secret key may be. The attack is completely successfully if the corresponding plaintexts can be deduced or, even better, the key. It should be pointed out that there is some size limitations in the presented COA scheme. If the size of the original plaintexts is too small, the restored images will be distorted caused by the lower signal-to-noise ratio (SNR) of measures autocorrelation pattern.
Cervantes – Don Quixote
Wear Quixote, the biggest part of Cervantes, is a one of a kind book with a few angles. From the second when it showed up, it satisfies perusers, makes them think, and its effect stretches out not exclusively to works with auxiliary incentive in writing yet additionally to all around significant works. Wear Quijote is fixated on perusing the sentiment of the country’s man of honor, an enthusiastic foresightable knight, the soul of the knight, and safeguarding the abused right misstep; Cervantes is distinctive, numerous dialects is. The name of the legend is acquired as an overall term for the individuals who are roused by high and unreasonable beliefs.
At Cervantes’ Don Quixote, Sancho attempted to do this by coordinating realities and stories as opposed to by isolating the two “classifications” – for him the story is genuine or valid. He should talk here and there, and it must be loyal instead of cause inconvenience – Quixote won’t have this. By requesting truth and equity (not realities), he will live as though these things turned into the behavior that most people find acceptable. Wear Quixote has an extraordinary idealistic vision that changes reality through point of view. Be that as it may, this doesn’t make life simpler. Tremendous windmill (organization, media, war machine), mankind, plan to devastate hyperopic things
The harmony among optimism and the truth is frequently hard to track down. Miguel de Cervantes’ epic “Wear Quixote” subtleties the battle in the center stage. Through the job of Don Quixote and Sancho Panza, Cervantes shows the provokes an individual appearances to adjust vision and levelheaded idea and their lives. Cervantes has built up this battle through name issues. In Cervantes, the name of the town was overlooked, and Don Quixote gave a silly name demonstrating the absurdity of cautiously receiving outrageous ideas. Cervantes takes a case of exorbitant vision and logic. When joining passing and reason, Cervantes assumes that balanced reasoning is aimless. In any case, his dumb portrayal of Don Quixote in his experience additionally shows futility. By switching the last two jobs, Cervantes uncovered that it does not merit utilizing only a solitary outlook.