Write one to two paragraphs in a separate document that you can upload (e.g., Microsoft Word file). Precede each answer with the question and its corresponding number.
- What is the difference between cryptography and cryptanalysis?
- What is a hash function, and what can it be used for?
- What is steganography, and what can it be used for?
- How does physical access control differ from the logical access control described in previous weeks? How is it similar?
- What is a mantrap? When should it be used?
- What is the “cleared counsel” model? When is this model used? Discuss the types of problems inherent in this model?
NO PLAGIARISM. ALL REFERNCES MUST BE CITED IN APA.