Assignment Description
Graduate Programs Discussion Boards
Discussion Boards (DB) are a key component of online learning. They foster active participation of learners and dialog with fellow learners and instructors. Graduatelevel courses require learners to create original posts to course DBs and to engage in dialogue by responding to posts created by others throughout the course. Original posts and responses should be substantive, and if references are made to the works of others, APA guidelines for intext citations and references apply.
Minimum Weekly DB Expectations
Post an original and thoughtful Main Post to the DB prompt. Respond to at least 2 other posts from learners and/or the instructor (Response Posts). The first contribution (Main Post or Response Post) must be posted before midnight (Central time) on Friday of each week. Two additional responses are required after Friday of each week. For DB assignment prompts with a Part One and Part Two, Part One should be addressed in the first week of the unit with a Main Post and minimum of 2 Response Posts, and Part Two should be addressed in the second week of the unit with a Main Post and a minimum of 2 Response Posts.
More on DBs
At the end of each unit, DB participation is assessed based on level of engagement and the quality of the contribution to the discussion. DBs allow learners to learn through sharing ideas and experiences as they relate to course content. Because it is not possible to engage in twoway dialogue after a conversation has ended, no posts to the DB are accepted after the end of the unit. Learners must demonstrate an appropriate depth of understanding of course content to receive credit for having submitted substantive posts. Typically, this is achieved with 3–4 strong paragraphs for Main Posts and 2–3 strong paragraphs for Response Posts.
Review the following LinkedIn Learning videos to help you with your assignments in this Unit.
Explain the following concepts:
What is your understanding of the difference between a stream cipher and a block cipher? What are two ways to launch a cryptanalytic attack against a cipher (based upon what the attacker knows or has in possession)? Be sure to provide detailed examples with supporting research. What is your understanding of the difference between an unconditionally secure cipher and a computationally secure cipher? Your organization has asked for a cryptographic algorithm recommendation for a new project that requires highlevel security. What algorithm would you recommend and why?
The following grading rubric will be used for this assignment.
In your own words, post a substantive response to the Discussion Board question(s) and comment on other postings. Your response should address the DB question(s) and move the conversation forward. You will be graded on the quality of your postings, including mastery of the concept as well as critical thinking. If asked for your opinion, do not simply state that it is a good or bad idea; elaborate on your reasons and argument. Include enough detail to substantiate your thinking as well as your position on the questions or comments.
For assistance with your assignment, please use your text, Web resources, and all course materials.
Reading Assignment Stallings, Chap. 1, 3 4, App. B3, B.4
Read selected articles from the AIU Library as identified in the Learning Materials.
Assignment Objectives Identify unsound security practices in software systems.
Other Information There is no additional information to display at this time.
Legend Extra Credit View Assignment Rubric
Unit 1 Discussion Board
Assignment Overview
Unit: Conventional Encryption Techniques Due Date: Tue,6/28/22 Grading Type: Numeric Points Possible: 60 Points Earned: Deliverable Length: See Assignment Details
Type: Discussion Board
Go To:
Looking for tutoring? Go to Smarthinking
Assignment Details Learning Materials Reading Assignment
My Work:
Online Deliverables: Discussion Board
11:19 PM (CT)
Assignment Details
Assignment Description
Graduate Programs Discussion Boards
Discussion Boards (DB) are a key component of online learning. They foster active participation of learners and dialog with fellow learners and instructors. Graduatelevel courses require learners to create original posts to course DBs and to engage in dialogue by responding to posts created by others throughout the course. Original posts and responses should be substantive, and if references are made to the works of others, APA guidelines for intext citations and references apply.
Minimum Weekly DB Expectations
Post an original and thoughtful Main Post to the DB prompt. Respond to at least 2 other posts from learners and/or the instructor (Response Posts). The first contribution (Main Post or Response Post) must be posted before midnight (Central time) on Friday of each week. Two additional responses are required after Friday of each week. For DB assignment prompts with a Part One and Part Two, Part One should be addressed in the first week of the unit with a Main Post and minimum of 2 Response Posts, and Part Two should be addressed in the second week of the unit with a Main Post and a minimum of 2 Response Posts.
More on DBs
At the end of each unit, DB participation is assessed based on level of engagement and the quality of the contribution to the discussion. DBs allow learners to learn through sharing ideas and experiences as they relate to course content. Because it is not possible to engage in twoway dialogue after a conversation has ended, no posts to the DB are accepted after the end of the unit. Learners must demonstrate an appropriate depth of understanding of course content to receive credit for having submitted substantive posts. Typically, this is achieved with 3–4 strong paragraphs for Main Posts and 2–3 strong paragraphs for Response Posts.
Review the following LinkedIn Learning videos to help you with your assignments in this Unit.
Explain the following concepts:
What is your understanding of the difference between a stream cipher and a block cipher? What are two ways to launch a cryptanalytic attack against a cipher (based upon what the attacker knows or has in possession)? Be sure to provide detailed examples with supporting research. What is your understanding of the difference between an unconditionally secure cipher and a computationally secure cipher? Your organization has asked for a cryptographic algorithm recommendation for a new project that requires highlevel security. What algorithm would you recommend and why?
The following grading rubric will be used for this assignment.
In your own words, post a substantive response to the Discussion Board question(s) and comment on other postings. Your response should address the DB question(s) and move the conversation forward. You will be graded on the quality of your postings, including mastery of the concept as well as critical thinking. If asked for your opinion, do not simply state that it is a good or bad idea; elaborate on your reasons and argument. Include enough detail to substantiate your thinking as well as your position on the questions or comments.
For assistance with your assignment, please use your text, Web resources, and all course materials.
Reading Assignment Stallings, Chap. 1, 3 4, App. B3, B.4
Read selected articles from the AIU Library as identified in the Learning Materials.
Assignment Objectives Identify unsound security practices in software systems.
Other Information There is no additional information to display at this time.
Legend Extra Credit View Assignment Rubric
Unit 1 Discussion Board
Assignment Overview
Unit: Conventional Encryption Techniques Due Date: Tue,6/28/22 Grading Type: Numeric Points Possible: 60 Points Earned: Deliverable Length: See Assignment Details
Type: Discussion Board
Go To:
Looking for tutoring? Go to Smarthinking
Assignment Details Learning Materials Reading Assignment