CIS 298 Week 5 Individual: Encryption Technologies

0 items
CIS 298 Week 5 Individual: Encryption Technologies
CIS 298 Week 5 Individual: Encryption Technologies
$8.99
  • Description

CIS 298 Week 5 Individual: Encryption Technologies

Compare each set of terms below.

Include a definition for each term, the similarities, and differences between the two terms.

  • Encryption at rest vs. Communication encryption
  • Disaster Recovery Planning vs. Business Continuity Planning
  • Breach vs. Hack
  • PHI vs. PPI
  • Authentication vs. Authorization

Fulfill the objectives of this assignment by choosing one of the following options:

  • Option 1: A chart featuring detailed descriptions
  • Option 2: A 6- to 8-slide presentation with detailed speaker notes or audio narration
  • Option 3: A 1- to 2-page paper in APA format

Submit your comparison to the Assignment Files tab above.