Joe, the Chief Executive Officer (CEO), was an Information security professor and a Subject Matter Expert for
over 20 years. He has designed a network defense method which he says is significantly better than prominent
international standards. He has recommended that the company use his cryptographic method. Which of the
following methodologies should be adopted?
A.
The company should develop an in-house solution and keep the algorithm a secret.
B.
The company should use the CEO’s encryption scheme.
C.
The company should use a mixture of both systems to meet minimum standards.
D.
The company should use the method recommended by other respected information security organizations.