Minutes of Meeting: SSD/III
 
            
        
        Written by Yusuf on 
                   
        
        
            
     
    
A. Agenda
- First draft checking
B. Discussed
- We all agree about the diagram. Will enhance it.
- Contents are good so far, but word count exceeds limit.
C. Notes
D. Action Item
- Trim down the document’s word count
Explore more like this
SSD Reflection
As technology advances, there is a security trade-off along with it – that is new vulnerabilities (Scheneier, 2014). An article said that the rate of cybercrime is growing consistently with...
 Yusuf 
                
                30 May 2022
                
                
                
                Yusuf 
                
                30 May 2022
                
                
            Final Project Evaluation
Our final product is different from our design proposal document. Several features that we committed earlier was deprioritized. Those features are Trust-based authorization and encrypt-decrypt based on user key. Trust-based...
 Yusuf 
                
                28 May 2022
                
                
                
                Yusuf 
                
                28 May 2022
                
                
            Unit 8-10: Collaborative Discussion 2 Summary - TrueCrypt
From the report, we can see that there are vulnerabilities contained within TrueCrypt ranging from low to medium severity (Junestam & Guigo, 2014),. In addition, these issues are bugs rather...
 Yusuf 
                
                26 May 2022
                
                
                
                Yusuf 
                
                26 May 2022
                
                
             
     
                    
                
             
                    
                
             
                    
                
            
Comments