Academic Integrity: tutoring, explanations, and feedback — we don’t complete graded work or submit on a student’s behalf.

Your book discusses software development policy; list some of the concepts discu

ID: 3891437 • Letter: Y

Question

Your book discusses software development policy; list some of the concepts discussed using at least 100+ words list software development policy rules and guidelines from your chapter reading (you can list them and then use your own words to assess what it means). Create a document and upload here.

Configuration management drives security but what is meant by this statement?  Use your best researching skills to help answer this question.

Encryption, simply put, is scrambled data and a key with which to decode it.  There are some major encryption methods and many tools to encrypt data.  For this part of your assignment, you are to find some tools to encrypt and write about, at least, two of them.  Speak about how to encrypt your data (whether simple email messages or data sent to servers for research). You may start you journey and investigation by looking up “common encryption algorithms” and then “encryption software”.  For those of you who already encrypt, congrats!  You may explain your use of encryption (here in part 2 of this assignment).  However, make sure to do more research to see if there are more robust tools available on the market today and explain that here as well. Find, at least, one “professional article related to this topic and post a professional APA citation for the article.

Explanation / Answer

Answer)

Some of the policies are as follows:

In the world of digitalization configuration management plays a vital role, which is categorized into business process infrastructure, operations and services, and end products.

Some of the encryption tools are ROT13, cryptography tools

Hire Me For All Your Tutoring Needs
Integrity-first tutoring: clear explanations, guidance, and feedback.
Drop an Email at
drjack9650@gmail.com
Chat Now And Get Quote