Question 1
Write a four- to five-page critical essay dealing with the following questions.
- What are the security and privacy risks and vulnerabilities in using the Internet in Saudi Arabia specific to your organization?
- List some specific common attack strategies and describe how they work and describe their effects/consequences on the security and privacy of both individual users and your organization in Saudi Arabia. Cite some specific examples and show how the damage can be mitigated or avoided (if possible).
Your paper should meet the following structural requirements:
- The paper should be 4-5 pages in length, not including the cover sheet and reference page.
- Format according to APA
- Provide support for your statements with in-text citations from a minimum of three scholarly resources. Two of these sources may be from the class readings, textbooks, or lectures, but one must be external.
Question 2
Answer each of the following questions with at least 400 words, each.
1) What are hash functions and why are they important?
2) Describe how Message Authentication Codes (MACs) are used in data security.