Please number your answers so they correspond to the questions listed below.
After each answer (or clearly state within the answer) the source(s) used. Although form and style is not considered in grading of this assignment, it may be a good opportunity to practice APA form and style rules for citing sources.
- Many sources state that encryption attracts hackers as it is a flag that something is being hidden.
- When should you encrypt?
- What is the difference between encryption and a digital signature?
- Explain why key length is important with encryption. Would this same length concept apply to passwords?
- Look at the PATRIOT ACT.
- What impact has this act had on Information Systems Security?
- What are the advantages of PATRIOT ACT for Law Enforcement?
- Do you think the PATRIOT ACT infringes on individual rights?(Student Opinion, no source required)
Submit your answers in Word or RTF format.