Transcript You are an enterprise security architect for a company in a semiconductor manufacturing industry where maintaining competitive advantage and protecting intellectual property is vital. Youre in charge of security operations and strategic security planning. Your responsibilities include devising the security protocols for identification access and authorization management. You recently implemented cryptography algorithms to protect the information organization. Leadership is pleased with your efforts and would like you to take protection methods even further. Theyve asked you to study cyberattacks against different cryptography mechanisms and deploy access control programs to prevent those types of attacks. “Wed like you to create plans for future security technology deployments” says one senior manager “and provide documentation so that others can carry out the deployments.” A director chimes in: “But you should also devise a method for ensuring the identification integrity and nonrepudiation of information in transit at rest and in use within the organization.” As the enterprise security architect you are responsible for providing the following deliverables: Create a network security vulnerability and threat table in which you outline the security architecture of the organization the cryptographic means of protecting the assets of the organizations the types of known attacks against those protections and means to ward off the attacks. This document will help you manage the current configuration of the security architecture. Create a Common Access Card CAC deployment strategy in which you describe the CAC implementation and deployment and encryption methodology for information security professionals. Create an email security strategy in which you provide the public key/private key hashing methodology to determine the best key management system for your organization. These documents will provide a security overview for the leadership in your company. Close Encryption uses cryptographic algorithms to obfuscate data. These complex algorithms transform data from human-readable plaintext into encrypted cipher text. Encryption uses the principles of substitution and permutation to ensure that data is transformed in a nondeterministic manner by allowing the user to select the password or a key to encrypt a message. The recipient must know the key in order to decrypt the message translating it back into the human-readable plaintext. There are six steps that will lead you through this project. After beginning with the workplace scenario continue to Step 1: IT Systems Architecture. The deliverables for this project are as follows: 1- Create a single report in Word document format. This report should be about 10 pages long double-spaced with citations in APA format. Page count does not include diagrams or tables. The report must cover the following: network security and threat table Common Access Card deployment strategy email security strategy 2- In a Word document share your lab experience and provide screenshots to demonstrate that you performed the lab. Competencies Your work will be evaluated using the competencies listed below. 1.5: Use sentence structure appropriate to the task message and audience. 1.6: Follow conventions of Standard Written English. 1.7: Create neat and professional looking documents appropriate for the project or presentation. 2.1: Identify and clearly explain the issue question or problem under critical consideration. 2.2: Locate and access sufficient information to investigate the issue or problem. 2.3: Evaluate the information in a logical and organized manner to determine its value and relevance to the problem. 2.4: Consider and analyze information in context to the issue or problem. 3.2: Employ mathematical or statistical operations and data analysis techniques to arrive at a correct or optimal solution. 5.1: Knowledge of procedures tools and applications used to keep data or information secure including public key infrastructure point-to-point encryption an Project 4: Cryptography Start Here Step 1: IT Systems ArchitectureStep 2: Plan of ProtectionStep 3: Data Hiding Technologies Step 4: Create the Network Security Vulnerability and Threat Table Step 5: Access Control Based on Smart Card Strategies Step 6: The Email Security Strategy smart cards. Requirements: 10 | .doc file
Delivering a high-quality product at a reasonable price is not enough anymore.
That’s why we have developed 5 beneficial guarantees that will make your experience with our service enjoyable, easy, and safe.
You have to be 100% sure of the quality of your product to give a money-back guarantee. This describes us perfectly. Make sure that this guarantee is totally transparent.Read more
Each paper is composed from scratch, according to your instructions. It is then checked by our plagiarism-detection software. There is no gap where plagiarism could squeeze in.Read more
Thanks to our free revisions, there is no way for you to be unsatisfied. We will work on your paper until you are completely happy with the result.Read more
Your email is safe, as we store it according to international data protection rules. Your bank details are secure, as we use only reliable payment systems.Read more
By sending us your money, you buy the service we provide. Check out our terms and conditions if you prefer business talks to be laid out in official language.Read more