IT&C
585
Encryption Implementation
Hours
3.0 Credit, 2 Lecture, 3 Lab
Semester
Fall
Encryption as a means for protecting data. How to implement encryption to accomplish security objectives. Selection of appropriate algorithms and protocols. Legal and regulatory requirements related to encryption.
Encryption Application
Explain the purpose of encryption, including common security problems that encryption can solve and those security problems that are not appropriate for encryption.
Encryption Key Management
Explain the importance of encryption key management in the security of the encryption implementation. Describe each phase of a key’s life and the security concerns for each.
Implementation
Implement common industry encryption systems in controlled environments.
Standards
Explain applicable industry standards and regulations governing implementation of encryption.