UK: +44 748 007-0908, USA: +1 917 810-5386 [email protected]

Research different options for encrypting and securing email.

Use the Internet to research different options for encrypting and securing email. Create a

table that lists at least five options. Include the advantages and disadvantages of each. Which

would you recommend? Why? Write a one-paragraph explanation along with your table.

  1. Complete Case Project 8-2 from page 368(chapter 8). Only one page is needed.

Case Project 8-2: Wireless Peripheral Attacks

Attacks on wireless mice and keyboards are not uncommon. Use the Internet to research

these attacks. How do the attacks occur? What is the vulnerability that is exploited? How can

vendors of these products secure them? Write a one-page paper on your research.

Ready to Score Higher Grades?