Need help with your Discussion

Get a timely done, PLAGIARISM-FREE paper
from our highly-qualified writers!

glass
pen
clip
papers
heaphones

Cryptographic Software

Cryptographic Software

Cryptographic Software

Question Description

Case Study: Why Does Cryptographic Software Fail?

Read the case study titled, “Why Does Cryptographic Software Fail? A Case Study and Open Problems,” (original article located at http://people.csail.mit.edu/nickolai/papers/lazar-cryptobugs.pdf). Use the Internet to research the US Office of Personnel Management (OPM) and the 2015 data breach. Also, research the results that multiple organizations have experienced when they have implemented cryptographic software.

Write a three to four (3-4) page paper in which you:

  1. Examine two (2) major mistakes OPM made with cryptographic software. Recommend two (2) actions that companies can take in order to avoid these common mistakes and vulnerabilities with cryptographic software
  2. Briefly describe OPM and its experience with cryptographic software. Analyze the company’s actions (or lack thereof) following the mistake and / or vulnerability
  3. Provide your opinion on OPM’s actions or plans to correct the mistake and / or vulnerability to avoid it from reoccurring. If OPM has not corrected or does not have a plan to correct the mistake and / or vulnerability, suggest one (1) action that it should take in order to correct the mistake and / or vulnerability. Provide a rationale for your response
  4. Examine the most common results that OPM have experienced when they implemented cryptographic software. Speculate two (2) reasons why organizations see such results. Provide a rationale for your response
  5. Use at least four (4) quality references in this assignment

Note: Wikipedia and similar Websites do not qualify as quality resources.

Your assignment must follow these formatting requirements:

  • Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA. Check with your professor for any additional instructions
  • Include a cover page containing the title of the assignment, the student’s name, the professor’s name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length

The specific course learning outcomes associated with this assignment are:

  • Examine the challenges of computer security, including different threats and types of attacks
  • Describe computational security and symmetric encryption techniques and adoption to modern organizations
  • Use technology and information resources to research issues in cryptography
  • Write clearly and concisely about cryptography using proper writing mechanics and technical style conventions

Grading for this assignment will be based on answer quality, logic / organization of the paper, and language and writing skills, using the following rubric.

Points: 110

Case Study 3: Why Does Cryptographic Software Fail?

Criteria

Unacceptable

Below 70% F

Fair

70-79% C

Proficient

80-89% B

Exemplary

90-100% A

1. Examine two (2) major mistakes OPM made with cryptographic software. Recommend two (2) actions that companies can take in order to avoid these common mistakes and vulnerabilities with cryptographic software.

Weight: 20%

Did not submit or incompletely examined two (2) major mistakes that OPM made with cryptographic software. Did not submit or incompletely recommended two (2) actions that companies can take in order to avoid these common mistakes and vulnerabilities with cryptographic software.

Partially examined two (2) major mistakes that OPM made with cryptographic software. Partially recommended two (2) actions that companies can take in order to avoid these common mistakes and vulnerabilities with cryptographic software.

Satisfactorily examined two (2) major mistakes that OPM made with cryptographic software. Satisfactorily recommended two (2) actions that companies can take in order to avoid these common mistakes and vulnerabilities with cryptographic software.

Thoroughly examined two (2) major mistakes that OPM made with cryptographic software. Thoroughly recommended two (2) actions that companies can take in order to avoid these common mistakes and vulnerabilities with cryptographic software.

2. Briefly describe OPM and its experience with cryptographic software. Analyze the company’s actions (or lack thereof) following the mistake and / or vulnerability.

Weight: 20%

Did not submit or incompletely briefly described OPM and its experience with cryptographic software. Did not submit or incompletely analyzed the company’s actions (or lack thereof) following the mistake and / or vulnerability.

Partially briefly described OPM and its experience with cryptographic software. Partially analyzed the company’s actions (or lack thereof) following the mistake and / or vulnerability.

Satisfactorily briefly described OPM and its experience with cryptographic software. Satisfactorily analyzed the company’s actions (or lack thereof) following the mistake and / or vulnerability.

Thoroughly briefly described OPM and its experience with cryptographic software. Thoroughly analyzed the company’s actions (or lack thereof) following the mistake and / or vulnerability.

3. Provide your opinion on OPM’s actions or plans to correct the mistake and / or vulnerability to avoid it from reoccurring. If OPM has not corrected or does not have a plan to correct the mistake and / or vulnerability, suggest one (1) action that it should take in order to correct the mistake and / or vulnerability. Provide a rationale for your response.

Weight: 20%

Did not submit or incompletely provided your opinion on OPM’s actions or plans to correct the mistake and / or vulnerability to avoid it from reoccurring. Did not submit or incompletely suggested one (1) action that it should take in order to correct the mistake and / or vulnerability if OPM has not corrected or does not have a plan to correct the mistake and / or vulnerability. Did not submit or incompletely provided a rationale for your response.

Partially provided your opinion on OPM’s actions or plans to correct the mistake and / or vulnerability to avoid it from reoccurring. Partially suggested one (1) action that it should take in order to correct the mistake and / or vulnerability if OPM has not corrected or does not have a plan to correct the mistake and / or vulnerability. Partially provided a rationale for your response.

Satisfactorily provided your opinion on OPM’s actions or plans to correct the mistake and / or vulnerability to avoid it from reoccurring. Satisfactorily suggested one (1) action that it should take in order to correct the mistake and / or vulnerability if OPM has not corrected or does not have a plan to correct the mistake and / or vulnerability. Satisfactorily provided a rationale for your response.

Thoroughly provided your opinion on OPM’s actions or plans to correct the mistake and / or vulnerability to avoid it from reoccurring. Thoroughly suggested one (1) action that it should take in order to correct the mistake and / or vulnerability if OPM has not corrected or does not have a plan to correct the mistake and / or vulnerability. Thoroughly provided a rationale for your response.

4. Examine the most common results OPM has experienced when they implemented cryptographic software. Speculate two (2) reasons that organizations see such results. Provide a rationale for your response.

Weight: 25%

Did not submit or incompletely examined the most common results OPM has experienced when they implemented cryptographic software. Did not submit or incompletely speculated two (2) reasons that organizations see such results. Did not submit or incompletely provided a rationale for your response.

Partially examined the most common results OPM has experienced when they implemented cryptographic software. Partially speculated two (2) reasons that organizations see such results. Partially provided a rationale for your response.

Satisfactorily examined the most common results OPM has experienced when they implemented cryptographic software. Satisfactorily speculated two (2) reasons that organizations see such results. Satisfactorily provided a rationale for your response.

Thoroughly examined the most common results OPM has experienced when they implemented cryptographic software. Thoroughly speculated two (2) reasons that organizations see such results. Thoroughly provided a rationale for your response.

5. Provide three (3) references.

Weight: 5%

No references provided.

Does not meet the required number of references; some or all references poor quality choices. Uses Internet references not published within the past [1] year.

Meets number of required references; all references high quality choices. Uses Internet references published within the past [1] year.

Exceeds number of required references; all references high quality choices. Uses Internet references published within the past [1] year.

6. Clarity, writing mechanics, and formatting requirements.

Weight: 10%

More than 6 errors present.

5-6 errors present.

3-4 errors present.

0-2 errors present.

Have a similar assignment? "Place an order for your assignment and have exceptional work written by our team of experts, guaranteeing you A results."

Order Solution Now

Our Service Charter


1. Professional & Expert Writers: Eminence Papers only hires the best. Our writers are specially selected and recruited, after which they undergo further training to perfect their skills for specialization purposes. Moreover, our writers are holders of masters and Ph.D. degrees. They have impressive academic records, besides being native English speakers.

2. Top Quality Papers: Our customers are always guaranteed of papers that exceed their expectations. All our writers have +5 years of experience. This implies that all papers are written by individuals who are experts in their fields. In addition, the quality team reviews all the papers before sending them to the customers.

3. Plagiarism-Free Papers: All papers provided by Eminence Papers are written from scratch. Appropriate referencing and citation of key information are followed. Plagiarism checkers are used by the Quality assurance team and our editors just to double-check that there are no instances of plagiarism.

4. Timely Delivery: Time wasted is equivalent to a failed dedication and commitment. Eminence Papers are known for the timely delivery of any pending customer orders. Customers are well informed of the progress of their papers to ensure they keep track of what the writer is providing before the final draft is sent for grading.

5. Affordable Prices: Our prices are fairly structured to fit in all groups. Any customer willing to place their assignments with us can do so at very affordable prices. In addition, our customers enjoy regular discounts and bonuses.

6. 24/7 Customer Support: At Eminence Papers, we have put in place a team of experts who answer all customer inquiries promptly. The best part is the ever-availability of the team. Customers can make inquiries anytime.

We Can Write It for You! Enjoy 20% OFF on This Order. Use Code SAVE20

Stuck with your Assignment?

Enjoy 20% OFF Today
Use code SAVE20