25 Sep I need 2 different Documents as one is for the dis
I need 2 different Documents as one is for the discussion and the other one is for Assignment and both should be plagiarism free,Discussion Topic:DB-4Malicious individuals have discovered several methods to attack and defeat cryptosystems. It’s important that you understand the threats posed by cryptographic attacks to minimize the risks to your network systems.Identify one cryptographic attack and how you can protect against it.Response GuidelinesParticipants must create a thread in order to view other threads in this forum. Post by the end of Wednesday to allow other students to read your threat and provide comments.Your main post should be a minimum of 250 words. Make sure your peer discussion address some of the terms and concepts presented in the course with a minimum of 100 words.Please respond to at least two learners. Your responses should be substantive (minimum of 100 words) and do at least one of the following:Ask a probing question.Offer a suggestion.Elaborate on a particular point.Provide an alternative opinion.Responses to peers such as ‘I agree with your point’, or responses that are not substantive and at the Graduate level will not receive maximum points.In your responses, reference the assigned readings and other theoretical, empirical, or professional literature as needed to support your views and writing.ASSIGNMENT TOPIC:Attached Files: 2014-01-jitr-passwords-2.pdf (348.651 KB) Article Review Template(1).docx (15.677 KB)Review the attached article titled : ‘Information and Password Attacks on Social Networks: An Argument for Cryptography’. Then use the Article Review Template to complete the written review.Must be in APA format.