Fill This Form To Receive Instant Help

Help in Homework
trustpilot ratings
google ratings


Homework answers / question archive / Project 4 - Cryptography You are an enterprise security architect for a company in a semiconductor manufacturing industry where maintaining competitive advantage and protecting intellectual property is vital

Project 4 - Cryptography You are an enterprise security architect for a company in a semiconductor manufacturing industry where maintaining competitive advantage and protecting intellectual property is vital

Computer Science

Project 4 - Cryptography You are an enterprise security architect for a company in a semiconductor manufacturing industry where maintaining competitive advantage and protecting intellectual property is vital. You're in charge of security operations and strategic security planning. Your responsibilities include devising the security protocols for identification, access, and authorization management. You recently implemented cryptography algorithms to protect the information organization. Leadership is pleased with your efforts and would like you to take protection methods even further. They've asked you to study cyberattacks against different cryptography mechanisms and deploy access control programs to prevent those types of attacks. "We'd like you to create plans for future security technology deployments," says one senior manager, "and provide documentation so that others can carry out the deployments." A director chimes in: "But you should also devise a method for ensuring the identification, integrity, and nonrepudiation of information in transit at rest and in use within the organization." As the enterprise security architect, you are responsible for providing the following deliverables: Create a network security vulnerability and threat table in which you outline the security architecture of the organization, the cryptographic means of protecting the assets of the organizations, the types of known attacks against those protections, and means to ward off the attacks. This document will help you manage the current configuration of the security architecture. Create a Common Access Card, CAC deployment strategy, in which you describe the CAC implementation and deployment and encryption methodology for information security professionals. Create an email security strategy in which you provide the public key/private key hashing methodology to determine the best key management system for your organization. These documents will provide a security overview for the leadership in your company. Notes; Encryption uses cryptographic algorithms to obfuscate data. These complex algorithms transform data from human-readable plaintext into encrypted cipher text. Encryption uses the principles of substitution and permutation to ensure that data is transformed in a nondeterministic manner by allowing the user to select the password or a key to encrypt a message. The recipient must know the key in order to decrypt the message, translating it back into the human-readable plaintext. The deliverables for this project are as follows: 1. Create a single report in Word document format. This report should be about 10 pages long, double-spaced, with citations in APA format. Page count does not include diagrams or tables. The report must cover the following: o network security and threat table o Common Access Card deployment strategy o email security strategy You will provide this information in tabular format and call it the Network Security and Vulnerability Threat Table security architecture of the organization the cryptographic means of protecting the assets of the organization the types of known attacks against those types of protections means to ward off the attacks Include and define the following components of security in the architecture of your organization, and explain if threats to these components are likely, or unlikely: LAN security Identity management physical security personal security availability privacy Then list the security defenses you employ in your organization to mitigate these types of attacks. Plan of Protection Learn more about the transmission of files that do not seem suspicious but that actually have embedded malicious payload, undetectable to human hearing or vision. This type of threat can enter your Provide the leadership of your organization with your plan for protecting identity, access, authorization and nonrepudiation of information transmission, storage, and usage Data Hiding Technologies describe to your organization the various cryptographic means of protecting its assets. descriptions will be included in the network security vulnerability and threat table for leadership Encryption Technologies 1. Shift / Caesar cipher 2. Polyalphabetic cipher 3. One time pad cipher/Vernam cipher/perfect cipher 4. Block ciphers 5. triple DES 6. RSA 7. Advanced Encryption Standard (AES) 8. Symmetric encryption 9. Text block coding Data Hiding Technologies 1. Information hiding and steganography 2. Digital watermarking 3. Masks and filtering Network Security Vulnerability and Threat Table Describe the various cryptographic means of protecting its assets. descriptions will be included in the network security vulnerability and threat table for leadership Encryption Technologies 1. Shift / Caesar cipher 2. Polyalphabetic cipher 3. One time pad cipher/Vernam cipher/perfect cipher Access Control Based on Smart Card Strategies Describe how identity management would be a part of your overall security program and your CAC deployment plan:

Option 1

Low Cost Option
Download this past answer in few clicks

19.89 USD

PURCHASE SOLUTION

Already member?


Option 2

Custom new solution created by our subject matter experts

GET A QUOTE