0 items
- Description
CIS 298 Week 5 Individual: Encryption Technologies
Compare each set of terms below.
Include a definition for each term, the similarities, and differences between the two terms.
- Encryption at rest vs. Communication encryption
- Disaster Recovery Planning vs. Business Continuity Planning
- Breach vs. Hack
- PHI vs. PPI
- Authentication vs. Authorization
Fulfill the objectives of this assignment by choosing one of the following options:
- Option 1: A chart featuring detailed descriptions
- Option 2: A 6- to 8-slide presentation with detailed speaker notes or audio narration
- Option 3: A 1- to 2-page paper in APA format
Submit your comparison to the Assignment Files tab above.