Encryption Methodologies and Policy for CIO Review Assignment

User Generated

qubyvp

Computer Science

Description

Companies are susceptible to losing customer data to cyber-attackers and human errors, so organizations must properly protect their data and network.

In this assignment, you will create an Encryption Policy for CIO review. Use the organization you chose in the discussion Classifying an Organization's Sensitive Data.

Write a 2- to 2½-page policy, and ensure you:

  • List the organization’s sensitive data that must be protected.
  • Complete a matrix that compares the asymmetric and symmetric encryption methodologies (PKI, TLS, SSL) for protecting data within the network.
  • Describe at least 2 primary threats that could compromise the organization’s data.
  • Describe how the encryption methodologies thats hould be implemented to protect the organization’s sensitive data.

Format your citations according to APA guidelines.

User generated content is uploaded by users for the purposes of learning and should be used following Studypool's honor code & terms of service.

Explanation & Answer

Hello, i want to send you the complete taskso that you may have complete time to review the task

Running head: ENCRYPTION POLICYT

1

Encryption Policy
Name
Institution

ENCRYPTION POLICY

2

APPLE INC.
Most companies’ data are vulnerable and can be easily hacked by cyber-attackers; the main
cause of such errors is poor data protection mechanisms and the use of outdated network system
in data protection. This project will create an Encryption Policy for CIO Review that will ensure
all the data belonging to Apple Inc. is safe, backed up and classified according to the purpose.
Being a global company with very sensitive data, we are going to classify the data into five broad
categories before the information is encrypted into protected data.
1. Customer information- this is the most sensitive data at include, names, addresses, social
security numbers, emails etc.
2. Employee Data- the information has close similarities with customer data and can be
classified in the same category.
3. Intellectual Property & Trade Secrets-proper software must be developed and coded and
data stored should be about product specifications, competitive research and all the
information under non-disclosure agreement.
4. Operational and inventory information
5. Company specific data
The policy will cover all the electronics devices in the company, any media that can store
electronic data either Loyola Protected data or Loyola sensitive data as the policy defines data
classification. It will also cover scenarios where encryption must be applied when the data is
being transferred and the possible risks during the process.

ENCRYPTION POLICY

3

Asymmetric and Symmetric Encryption Methodologies in the Encryption Policy
All the servers used in authentication purposes must be valid papers with si...


Anonymous
I was stuck on this subject and a friend recommended Studypool. I'm so glad I checked it out!

Studypool
4.7
Trustpilot
4.5
Sitejabber
4.4

Similar Content

Related Tags