Site icon Doc Sity

UT AUSTIN Cryptography Discussion

UT AUSTIN Cryptography Discussion

Description

Part A

  1. Choose a topic that you find interesting from the week 2 reading materials that is also in the study notes, then read up on the topic. You can focus on content in your textbook and you can also conduct a Web search on the topic if you like.
  2. Next, after reading up on your topic, write out a question that you want your classmates to be able to answer. 

Answer these 2 questions as well: 

  1. What are some practices by some of your colleagues that you have witnessed in your work, or school that make you think that one day it will pose a vulnerability or security risk to your network and why? 
  2. What could happen if the computer is not accessed by nsidersü/li>

Link to notes: 

1) https://drive.google.com/file/d/17SwxsLncSRGqIeE6Rd3nPzm6MjKQmSLt/view?usp=drivesdk

  1. https://drive.google.com/file/d/1Jco8LeSnSw8ykSEnmjO1RZC1S5fG56ur/view?usp=drivesdk

Link to chapters:

Chap 3: https://docs.google.com/file/d/1i-gt2biUWfwZN9HVjEXQRFZrovugikpl/edit?usp=docslist_api&filetype=msword

Chapter 4: https://docs.google.com/file/d/14LUS7nNAzTjYKMx9Xj1qfV9_dnliM8BR/edit?usp=docslist_api&filetype=msword

Explanation & Answer:
2 Questions
User generated content is uploaded by users for the purposes of learning and should be used following our honor code & terms of service.

Have a similar assignment? "Place an order for your assignment and have exceptional work written by our team of experts, guaranteeing you A results."

Exit mobile version