Define key cryptographic terms

MSIS 535 – Cryptography. The course examines methods and techniques for concealing data for security purposes. Topics covered will include cryptographic techniques, approaches and technologies.

Upon completion of the course, students will be able to

 Define key cryptographic terms.

 Identify the characteristics of quantum cryptography.

 Match symmetric key algorithms to their corresponding descriptions.

 Distinguish between types of asymmetric algorithms.

 Determine the appropriate use for a given message format.

 Recognize types of ciphers.

 Match types of cryptanalytic attack with their corresponding descriptions.

 Determine the appropriate hash algorithm to use in a given scenario.

 Recognize characteristics of message authentication codes.

 Identify the characteristics of digital signatures.

 Identify guidelines for key management and distribution.

 Identify characteristics of the XKMS.

 Recognize the appropriate application of the split knowledge method of key management.

 Recognize methods of key distribution.

—————————————————————————————————————————-

MSIS 632 – Business Continuity Planning and Disaster Recovery Planning. The course examines the preservation of business activities when faced with disruptions or disasters. It involves the processes that are used to create a business continuity and disaster recovery plan and strategies for critical resource recovery.

Upon completion of the course, students will be able to

 Identify activities that occur during the project initiation phase of business continuity planning.

 Recognize considerations for business continuity and disaster recovery planning.

 Perform a business impact analysis on given business functions.

 Recognize key considerations when conducting a business impact analysis.

 Recognize the considerations that are weighed when determining an appropriate recovery strategy.

 Match recovery strategies for business operations to corresponding descriptions.

 Match recovery strategies for technology environments to corresponding descriptions.

 Recognize the components of a business continuity and disaster recovery plan.

 Identify the various test types for the plan.

——————————————————————-