- From the e-Activity, discuss how standards for encryption modules and algorithms benefit the furtherance of Web application security. As the corporate ISSO, assess how you can ensure that a vendor’s Web Server product implements an adequate security methodology.
- As the corporate ISSO, determine how you would ensure that Web applications are compliant with the applicable security standards. Select one such standard and explain how you would keep it in compliance.
- Go to the NIST FIPS 140-2 standards Website, located at http://csrc.nist.gov/publications/PubsFIPS.html , and read about the 140-2 encryption standards along with its annexes.