IT 286 Week 8 Checkpoint - Social Engineering Article Review


IT 286 Entire Course Link


Read the article “A Comparative Analysis of Tools for Verification of Security Protocols” in this week’s Electronic Reserve Readings.
Write a 350- to 700-word review addressing the sequential process the article discusses that highlights a specific but common risk to computer security. Discuss the steps you must take to protect systems under your care from similar risks.

Post your article review as an attachment.

Comparison of Tools for Verification of Security Protocols
The article discusses the sequential process to computer security which includes Scyther and ProVerif tools. Scyther is a tool which is used for security protocol verification where it is assumed that all the cryptographic functions are perfect. The tool provides a graphical user interface that makes it easier to verify and understand a protocol.
Powered by