CIS 298 Week 5 Individual Assignment Encryption Technologies
Instructions: In Week Four, you designed a hybrid wired and wireless network, identified the hardware Instructions: Compare each set of terms below. Include a definition for each term, the similarities, and differences between the two terms.
- Encryption at rest vs. Communication encryption
- Disaster Recovery Planning vs. Business Continuity Planning
- Breach vs. Hack
- PHI vs. PII
- Authentication vs. Authorization Fulfill the objectives of this assignment by choosing one of the following options:
- Option 1: A chart featuring detailed descriptions
- Option 2: A 6- to 8-slide presentation with detailed speaker notes or audio narration
- Option 3: A 1- to 2-page paper in APA format Submit your comparison to the Assignment Files tab above.
Questions & Answers
Have a Question?
Be the first to ask a question about this.