Friday, July 2, 2010

Encryption software

After studying some of the methods and algorithms for encryption, we need to understand how this is done in real life.

Suppose you are an IT security consultant, and one of your clients asks you to review for him the varios options (free and paid) that exist for encrypting sensitive data in his hard drive. Answer the following questions:

- Identify at least one software for personal and one for professional use that are available for encrypting sensitive data.
- For each of them, write a detailed sequence of instructions as to how to effectively encrypt the data.

Working in pairs, answer the question in a Word file. This file must be sent to itgs.sass@gmail.com before Wednesday, in encrypted form, together with another file that explains how to decrypt it, and why you have chosen that particular software.

No comments: