Minutes of Meeting: SSD/III
Written by Yusuf on
A. Agenda
- First draft checking
B. Discussed
- We all agree about the diagram. Will enhance it.
- Contents are good so far, but word count exceeds limit.
C. Notes
D. Action Item
- Trim down the document’s word count
Explore more like this
SSD Reflection
As technology advances, there is a security trade-off along with it – that is new vulnerabilities (Scheneier, 2014). An article said that the rate of cybercrime is growing consistently with...
Yusuf
30 May 2022
Final Project Evaluation
Our final product is different from our design proposal document. Several features that we committed earlier was deprioritized. Those features are Trust-based authorization and encrypt-decrypt based on user key. Trust-based...
Yusuf
28 May 2022
Unit 8-10: Collaborative Discussion 2 Summary - TrueCrypt
From the report, we can see that there are vulnerabilities contained within TrueCrypt ranging from low to medium severity (Junestam & Guigo, 2014),. In addition, these issues are bugs rather...
Yusuf
26 May 2022
Comments