UMGC Cyber Security Cryptography Research Report

User Generated

svgarffolze_g

Writing

University of Maryland Global Campus

Description

Unformatted Attachment Preview

Project Question You are an enterprise security architect for a company in a semiconductor manufacturing industry where maintaining competitive advantage and protecting intellectual property is vital. You're in charge of security operations and strategic security planning. Your responsibilities include devising the security protocols for identification, access, and authorization management. You recently implemented cryptography algorithms to protect the information organization. Leadership is pleased with your efforts and would like you to take protection methods even further. They've asked you to study cyberattacks against different cryptography mechanisms and deploy access control programs to prevent those types of attacks. "We'd like you to create plans for future security technology deployments," says one senior manager, "and provide documentation so that others can carry out the deployments." A director chimes in: "But you should also devise a method for ensuring the identification, integrity, and nonrepudiation of information in transit at rest and in use within the organization." As the enterprise security architect, you are responsible for providing the following deliverables: Create a network security vulnerability and threat table (please see below) in which you outline the security architecture of the organization, the cryptographic means of protecting the assets of the organizations, the types of known attacks against those protections, and means to ward off the attacks. This document will help you manage the current configuration of the security architecture. Create a Common Access Card, CAC deployment strategy, in which you describe the CAC implementation and deployment and encryption methodology for information security professionals. Create an email security strategy in which you provide the public key/private key hashing methodology to determine the best key management system for your organization. These documents will provide a security overview for the leadership in your company. Create a single report in Word document format. This report should be about 10 pages long, double spaced, with citations in APA format. Page count does not include diagrams or tables. The report must cover the following: • • • network security and threat table Common Access Card deployment strategy email security strategy IT System Assets LAN Security Identity management Physical security Personal security Availability Privacy Threats and Vulnerabilities Security Mechanisms to Address Threats and Vulnerabilities
Purchase answer to see full attachment
User generated content is uploaded by users for the purposes of learning and should be used following Studypool's honor code & terms of service.

Explanation & Answer

Attached. Please let me know if you have any questions or need revisions.

Cyber security

Student Name:
Institution Affiliation:
Date of submission:

1

Cyber security

2

Organization’s data is one of the most vital assets in an organization which when altered
by malicious hackers through cyber attacks can result into huge loss to the organization. This
loss is not limited to client’s data becoming exposed to the public and thus it becomes prone
to attack by malicious attacks, thus making most of the organization’s clients shun away from
the organization (Koblitz,1994). One of the World’s largest investment bank known as JP
Morgan was a victim of cyber attack in the year 2014, the Banks’s information system was
hacked by hackers who managed to get access to the customer’s credentials whereby over 83
million clients fell victim of the attack. Even though the banks as an entity did not lose
money it lost most of its clients, this is because they lost confidence with the bank as they felt
that the bank has not put enough measures to ensure their personal information was well
persevered with confidential measures expected (Katz,2020).The case of JP Morgan is a great
illustration of how important protection of organization’s data is vital and thus ought to be
given much attention, this is because customers are usually the number one priority in any
organization and if they in any way get dissatisfied with the quality of services offered by the
company, they end up withdrawing from the company. This project will be addressing the
various ways through which a company can be able to put enough measures to ensure that
customer’s data is well persevered so as to prevent it from attacks by the hackers.
Cryptography is one of the most of the effective method that is used to protect
organization’s information against hackers from getting hold of client’s information, it entails
the use of incomprehensible text that codes texts making them not readable to anyone who is
not authorized to get access to the information conveyed (Stinson & Paterson,2018).
Formerly the method relied upon encryption tools but with the advancement of the nature
of cybercrimes, cryptography has advanced to the use of mathematical and computer science
tools which are used to encrypt the information which is only meant for specified for only

Cyber security

3

specific people. Cryptography has over the time be acknowledged for being able to serve
several purposes which include the following;
Cryptography promotes integrity as the information contained in the organization’s
database is encrypted and can thus not be altered by any malicious hacker. The fact hackers
cannot be able to understand the content of the information it ensures the integrity of the
information as it cannot be accessed by hackers. Cryptography also ensures the
confidentiality of the information conveyed through different people; this is attributed to the
fact that the organization’s data is encrypted in a manner that it can only be the authorized
persons can be able to access the information, this reduced the chances of the organization’s
data from being disclosed to persons who are not permitted to have access to the data. The
system enhances authentication which enables both the sender and the receiver of the
information to be able to recognize each other, this ensures that no hacker can purport to part
of the organization and thus seek access to information. Cryptography is designed in such
away that the sender of data in the organization cannot deny that he sent the information as
the system shows proof of him having sent the information.
Forms of Cryptography
Symmetric key is one of the forms of cryptography which entails a special generated key
which is used to open encrypted information of an organization. Data sent by the sender to
the receiver is usually coded and is opened by the use of a special key number which when
used can be used to decrypt the data sent, this ensures that unauthorized persons cannot...


Anonymous
Really great stuff, couldn't ask for more.

Studypool
4.7
Trustpilot
4.5
Sitejabber
4.4

Similar Content

Related Tags