Skip to main content
IT&C
585

Encryption Implementation

Hours

3.0 Credit, 2 Lecture, 3 Lab

Semester

Fall
Encryption as a means for protecting data. How to implement encryption to accomplish security objectives. Selection of appropriate algorithms and protocols. Legal and regulatory requirements related to encryption.

Encryption Application

Explain the purpose of encryption, including common security problems that encryption can solve and those security problems that are not appropriate for encryption.

Encryption Key Management

Explain the importance of encryption key management in the security of the encryption implementation. Describe each phase of a key’s life and the security concerns for each.

Implementation

Implement common industry encryption systems in controlled environments.

Standards

Explain applicable industry standards and regulations governing implementation of encryption.