Course Summary
Applied Cryptography or CSOL 510 in the Master of Cybersecurity Operations and Leadership program is a course that introduces modern applied cryptography theory and practice and how cryptography is used to support information security missions. The duration of this course delivered an understanding through the hands-on training of scenarios such as Block Ciphers and Block Modes, Pseudo Number Generation, Public Key Infrastructure (PKI), Pretty Good Privacy (PGP), Cryptographic Security Controls, etc.
Course Artifacts

cryptography_final_project.pdf |
This artifact revolves around a fictitious company regulated by HIPAA (Health Insurance Portability and Accountability Act). It discusses the required technical requirements of the act to be reviewed by the executives and partners of the organization.
Reflections
Cryptography has four main objectives:
In recent years of digital evolution, cryptography has gained extreme popularity, primarily due to the impacts of poor management, the rise of quantum computing, and new cryptographic regulations. Expert implementation of cryptographic security controls is needed more than ever to battle against hidden instances and non-compliant cryptographic mechanisms. I was prompted to select the final project from CSOL 510, representing a fictitious company regulated by HIPAA (Health Insurance Portability and Accountability Act). HIPAA’s security rule requires organizations to provide good obfuscation to data at rest and in transit from prying eyes and also carries over to third-party vendors those organizations work with. This paper explores the ethical and professional implications of security controls necessary to the infrastructure of the given organization in the paper (Gruhn & Probst, 2021).
A security practitioner’s moral and professional obligation is to have a solid foundational knowledge of cryptographic mechanisms and standards and stay up to date as much as possible to tackle challenges of data protection as well as pay due diligence to their assigned responsibilities.
- Confidentiality: to ensure the information or message sent across platforms cannot be tapped into and understood for whom it is intended.
- Integrity: to ensure the integrity of the information. Data sent and received cannot go undetected if altered or tampered with.
- Non-repudiation: ensure the sender is provided with proof of delivery and the receiver is supplied with the sender’s identity. So later, none can deny having processed the information.
- Authentication: The sender and receiver can always confirm their identity and destination (Ethicalhackersacademy.com, 2021).
In recent years of digital evolution, cryptography has gained extreme popularity, primarily due to the impacts of poor management, the rise of quantum computing, and new cryptographic regulations. Expert implementation of cryptographic security controls is needed more than ever to battle against hidden instances and non-compliant cryptographic mechanisms. I was prompted to select the final project from CSOL 510, representing a fictitious company regulated by HIPAA (Health Insurance Portability and Accountability Act). HIPAA’s security rule requires organizations to provide good obfuscation to data at rest and in transit from prying eyes and also carries over to third-party vendors those organizations work with. This paper explores the ethical and professional implications of security controls necessary to the infrastructure of the given organization in the paper (Gruhn & Probst, 2021).
A security practitioner’s moral and professional obligation is to have a solid foundational knowledge of cryptographic mechanisms and standards and stay up to date as much as possible to tackle challenges of data protection as well as pay due diligence to their assigned responsibilities.
References
Ethicalhackersacademy.com. (2021, August 6). What is Cryptography, and How it Helps to Secure the Data? Ethical Hackers Academy. Retrieved February 20, 2023, from https://ethicalhackersacademy.com/blogs/ethical-hackers-academy/cryptography
Gruhn, D., & Probst, J. (2021, June 24). What Is Cryptography and Why Is It Important? Entrust. Retrieved February 20, 2023, from
Ethicalhackersacademy.com. (2021, August 6). What is Cryptography, and How it Helps to Secure the Data? Ethical Hackers Academy. Retrieved February 20, 2023, from https://ethicalhackersacademy.com/blogs/ethical-hackers-academy/cryptography
Gruhn, D., & Probst, J. (2021, June 24). What Is Cryptography and Why Is It Important? Entrust. Retrieved February 20, 2023, from