Explain the uses of encryption and the benefits of securing communications by hash functions and other types of encryption.
Evaluate and assess whether or not to incorporate file encryption full disc encryption, and partition encryption.
Discuss the benefits of using DES, triple DES, or other encryption technologies.
Describe the use and purpose of hashes and digital signatures in providing message authentication and integrity.
Explain the use of cryptography and cryptanalysis in data confidentiality.
Determine if it will be more effective to develop the SEs to perform these tasks, taking into consideration the need, cost, and benefits of adding cryptanalysts to the organization’s workforce.
Discuss alternative ways for obtaining cryptanalysis if the organization chooses not to maintain this new skilled community in-house