{"id":699,"date":"2017-02-15T12:33:08","date_gmt":"2017-02-15T04:33:08","guid":{"rendered":"http:\/\/people.utm.my\/rashidah\/?p=699"},"modified":"2018-02-11T13:41:16","modified_gmt":"2018-02-11T05:41:16","slug":"cryptography-task1","status":"publish","type":"post","link":"https:\/\/people.utm.my\/rashidah\/2017\/02\/15\/cryptography-task1\/","title":{"rendered":"Cryptography Task 1 | Security Threats, Services and Mechanism"},"content":{"rendered":"<h2><strong>CRYPTOGRAPHY &#8211; TASK 1<\/strong><\/h2>\n<p>As an <a href=\"http:\/\/www.cyberdegrees.org\/jobs\/security-consultant\/\">Security Consultant<\/a>, <strong>review ONE cryptography application<\/strong>, then;<\/p>\n<ol>\n<li>Identify and discuss the <strong>main task offered<\/strong>\u00a0that require security mechanism.<\/li>\n<li>Identify and elaborate <strong>security\u00a0threats<\/strong> against the application.<\/li>\n<li>Identify and explain existing<strong> cryptography security services<\/strong> and <strong>security mechanism<\/strong> of the application.<\/li>\n<\/ol>\n<p>Find the example of cryptography applications on <strong>Introduction note &#8211; page 2.<\/strong><\/p>\n<p><strong>Prepare a slide<\/strong> of your review results and present (more to knowledge sharing).<\/p>\n<p>Do follow<strong> the Guidelines<\/strong> of the task. [<a href=\"https:\/\/people.utm.my\/rashidah\/wp-content\/uploads\/sites\/729\/2017\/02\/TASK-1_SCSR3443-Crypto-17182.pdf\">pdf<\/a>]<\/p>\n<p>&nbsp;<\/p>\n<p><em>Other related information:<\/em><\/p>\n<ul>\n<li><a href=\"http:\/\/www.cyberdegrees.org\/jobs\/security-auditor\/\">Become A Security Auditor<\/a><\/li>\n<li><a href=\"http:\/\/www.cyberdegrees.org\/jobs\/security-consultant\/\">Become A Security Consultant<\/a><\/li>\n<li><a href=\"http:\/\/www.cyberdegrees.org\/jobs\/security-engineer\/\">Become A Security Engineer<\/a><\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>CRYPTOGRAPHY &#8211; TASK 1 As an Security Consultant, review ONE cryptography application, then; Identify and discuss the main task offered\u00a0that require security mechanism. Identify and elaborate security\u00a0threats against the application. Identify and explain existing cryptography security services and security mechanism of the application. Find the example of cryptography applications on Introduction note &#8211; page 2. &hellip; <a href=\"https:\/\/people.utm.my\/rashidah\/2017\/02\/15\/cryptography-task1\/\" class=\"more-link\">Continue reading <span class=\"screen-reader-text\">Cryptography Task 1 | Security Threats, Services and Mechanism<\/span><\/a><\/p>\n","protected":false},"author":582,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[32],"tags":[],"class_list":["post-699","post","type-post","status-publish","format-standard","hentry","category-cryptography"],"_links":{"self":[{"href":"https:\/\/people.utm.my\/rashidah\/wp-json\/wp\/v2\/posts\/699","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/people.utm.my\/rashidah\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/people.utm.my\/rashidah\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/people.utm.my\/rashidah\/wp-json\/wp\/v2\/users\/582"}],"replies":[{"embeddable":true,"href":"https:\/\/people.utm.my\/rashidah\/wp-json\/wp\/v2\/comments?post=699"}],"version-history":[{"count":0,"href":"https:\/\/people.utm.my\/rashidah\/wp-json\/wp\/v2\/posts\/699\/revisions"}],"wp:attachment":[{"href":"https:\/\/people.utm.my\/rashidah\/wp-json\/wp\/v2\/media?parent=699"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/people.utm.my\/rashidah\/wp-json\/wp\/v2\/categories?post=699"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/people.utm.my\/rashidah\/wp-json\/wp\/v2\/tags?post=699"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}