Your readings are about cryptography and distributed systems. How do these issues affect your ability to manage an I.T. system? Back in the ‘good old days (HA!), we had multi-user, stand-alone mainframe systems with a bunch of terminals. One system/security manager. As we pushed computing to the desktop with the advent of PCs, every user became a system manager and security manager, and we all know how *that is* working out! (Heck, today it is common for people to have home networks so they have also become *network* admins and security managers.)
How does cryptography help you in your role as an IT, system, and/or network manager? How do you use crypto in your organization? Encrypted communications channels (what kind)? Desktop encryption? Mobile device encryption? Encrypted cloud storage? Do you escrow corporate crypto keys; why or why not? The questions above are from the protecting-your-own-data perspective. But what do you think about criminals and other Bad Guys using encryption to prevent legal searches? Should use of crypto be an aggravating factor in civil and criminal cases? Have fun with the debate and discussion!
Discuss and interact regularly with your classmates, bringing the discussion to a close by the end of Week 4. Refer to the rubric for grading criteria.
You can hire someone to answer this question! Yes, assignist.com has paper writers, dedicated to completing research and summaries, critical thinking tasks, essays, coursework, and other homework tasks. Its fast and safe.