Discussion 1 Crypto
Write 500 words that respond to the following questions:
- Explain how can we use Hash function to ensure the security of online communication?
- How can we use Hash functions for intrusion and virus detections?
- Provide real life examples support your initial post.
- Be in APA format including your references.
- Be 500 words long (not including title and references).
- Do not re-state the questions.
- Include two sources (i.e. two references).
Discussion 2 Operation Security
Some organizations keep documents in Word format and publish them in PDF format. Other organizations use tools like Governance, Risk, and Compliance (GRC). What makes one type of tool better than the other?
- Be in APA format including your references.
- Be 500 words long (not including title and references).
- Do not re-state the questions.
- Include two sources (i.e. two references).