Security Protocol in Real Life Situations

Task1:

Use the library and other internet resources to research for answers for the following questions. Write a 2–3 pages research paper answering these questions.

Don't use plagiarized sources. Get Your Custom Essay on
Security Protocol in Real Life Situations
GET AN ESSAY WRITTEN FOR YOU FROM AS LOW AS $13/PAGE
Order Essay
  • What encryption standard is currently recommended by NIST and why? Explain your answer with examples.
  • How can we apply that security protocol in real life situations?
  • Provide at least two references to support your initial post.

Please note:

  • Apply APA format on your academic writings.
  • provide 2-3 pages long (not including title and references) as a word document.
  • Include title page, table of content page.
  • Use time new roman or Arial as font type.
  • Use 12 a font size.
  • Use double spaces.
  • Add running head to the upper left corner of your document.
  • Add page numbers to the upper right corner of your document.
  • Add a references page to the end of your document

Task2:

Security Protocol in Real Life Situations 1

Discuss the differences in policy requirements of the government and health care sectors. Additionally perform a quick search on the following agencies to determine similarities and differences:

  • National Institute of Standards and Technology (NIST) and National Security Agency (NSA) Web sites for information on policy requirements for the government sector
  • The Health Insurance Portability and Accountability Act (HIPAA) and any other laws that regulate the health care sector

Still stressed from student homework?
Get quality assistance from academic writers!