1. Using the Web or other resources, write a brief paper about quantum encryption. Of particular interest should be the current state of research in that field (as opposed to simple background/history). You should also address what significant impediments there are to implementing quantum encryption.
Using the Web and other resources, look up information on how IKE works.
Describe the methods used in keeping the key exchange secure.
What are possible weaknesses in the IKE method?
3. This chapter provides recommendations on accounts and passwords from the NSA, Microsoft, and the author. Using the Web (including but not limited to resources identified in this chapter), find recommendations from some other reliable source (CERT, SANS, any of the security certification vendors, etc.). Write a brief paper discussing those recommendations, paying particular attention to areas in which they differ from the recommendations given in this chapter.
a Using various Web resources, find a new virus active in the last 90 days.
b. Describe how the virus propagates, what it does, and how widely it has spread (the McAfee virus map should help you with that).
c .Describe any known damage the virus has caused.
d. Describe measures being taken to combat the virus.
4. Ask a local business or your college for a copy of its security policies. Study the policies carefully.
Summarize the main theme of these policy recommendations. Pay particular attention to any area in which these recommendations differ from or exceed the recommendations of this chapter.
Choose the policy recommendation you believe is the most secure, and state the reasons for your choice.