Encryption Algorithms

 1 page discussion 

  • As the cybersecurity specialist in HU Investment Firm, you are responsible for the security of the system. Identify one encryption algorithm that you believe will meet the requirement of improving the security posture with encryption algorithms.
  • Explain exactly how you would incorporate this into the security structure of this company.
  • Identify and explain the associated costs for the identified encryption algorithm. Take into consideration the procurement costs, i.e. software / licensing, implementation, configuring, and updating. 
Tags: No tags