IT 286 Week 8 Checkpoint - Social Engineering Article Review

**********************************************************

IT 286 Entire Course Link

https://uopcourses.com/category/it-286/

**********************************************************

Read the article “A Comparative Analysis of Tools for Verification of Security Protocols” in this week’s Electronic Reserve Readings.
Write a 350- to 700-word review addressing the sequential process the article discusses that highlights a specific but common risk to computer security. Discuss the steps you must take to protect systems under your care from similar risks.

Post your article review as an attachment.

Preview:
Comparison of Tools for Verification of Security Protocols
The article discusses the sequential process to computer security which includes Scyther and ProVerif tools. Scyther is a tool which is used for security protocol verification where it is assumed that all the cryptographic functions are perfect. The tool provides a graphical user interface that makes it easier to verify and understand a protocol.
Powered by