Joe, the Chief Executive Officer (CEO), was an Information security professor and a Subject Matter Expert for over 20 years. He has designed a network defense
method which he says is significantly better than prominent international standards. He has recommended that the company use his cryptographic method. Which
of the following methodologies should be adopted?
A.
The company should develop an in-house solution and keep the algorithm a secret.
B.
The company should use the CEO’s encryption scheme.
C.
The company should use a mixture of both systems to meet minimum standards.
D.
The company should use the method recommended by other respected information security organizations.