Course Title: Introduction to Information Assurance and Information Security, homework help

Anonymous

Question Description


Unit 4

The command office has asked for a presentation on security mechanisms including access control models, authentication, authorization and encryption. Describe

differences between them and identify situations where appropriate. Discuss how encryption relates to storage, network traffic, secure Web access, and the e-mailing of

documents. One topic of concern is symmetrical versus public key.

The presentation should include the following information:

Comparison of security mechanisms

An explanation of public key cryptography

Historical background of the development of encryption

Typical uses of public key cryptography

Symmetrical versus public key

Encryption and how it relates to storage, network traffic, secure Web access and e-mail

Prepare an 8–15slide

presentation to address these points. Include speaker notes in the presentation. Plan the presentation and speaker notes so that someone else

could actually give the presentation.

Be sure to document your references using APA format.

Unit 5

You have recently accepted a position as a network administrator supporting the computer network at Camp David the US Presidential retreat in Thurmont, Maryland.

The President has requested that a WEP wireless network be installed to support the computing needs of visiting dignitaries.

Your commanding officer is having second thoughts on using the wireless network that was first considered. He is concerned about the security of a wireless endpoints.

You have recently completed your ISC2 CISSP certification and the commanding officer would like you to draw upon your knowledge of secure architecture design and

prepare a slide presentation on wireless networking and what can be done to secure a wireless network.

Include the following:

Your answers to the 6 secure architecture data collection questions of:

Why are we building this system?

Who is going to use it and why?

How is it going to be used?

What environment will it work within?

What type of security and protection is required?

What does it need to be able to communicate with?

A sample assessment of how you would gather the information necessary to design secure architecture

Consider and recommend hardware and software solutions and remote access systems.

Conclude your presentation with your strategy for conducting a penetration test and vulnerability assessment to assure external nation state hackers cannot

breach the Camp David secure network.

Include substantial research material in the speaker notes

Prepare an 8–20slide

presentation to address these points. Include speaker notes in the presentation. Plan the presentation and speaker notes so that someone else

could actually give the presentation.

Tutor Answer

CASIMIR
School: UCLA

Here you go. In case of any further inputs, please let me know.All the best!I appreciate working with you!

Information
Security-Unit 4
NAME
COURSE
TUTOR
DATE

Security Mechanisms
Security mechanisms in networks are based on
blocking or limiting operations from any remote
system.
 Access Control Models- This is a security technique
that is used to regulate who can view and use the
resources present in a network or computing
environment. Access Control Model simply enables
one to control the ability of a process perform
various administration tasks as well as access
securable objects.
 Authentication- This is a security mechanisms that is
used by the remote systems to restrict access to
specific users. The term authentication refers to
authenticating users. It can also be used to refer to
authenticating software processes and devices.


Security Mechanisms


Authorization- Authentication controls who can
access a network but authorization controls what
one can do after they have accesses the network
or the resources.



Authorization simply grants privileges to the users
and the processes as well.



Encryption- This is a security technique that is used
t scramble it to protect it from being read anyone
else apart from the intended receiver.



An encryption device is used to encrypt the data
before it is sent to a network while a decryption
device is used to decrypt data after it has been
received.

Public Key Cryptography










Also known as asymmetric cryptography.
Public key cryptography is any cryptographic
technique that makes use of pairs of keys.
1. Public keys that may be disseminated widely
2. Private keys that are only known by the owner.
This technique accomplishes two security
mechanisms which are;
Authentication- a public key is used to verify that
indeed the holder of the private key is the one
who sent the message.
Authorization- the private key holder is able to
decrypt the data that had been encrypted by
the use of public key.

Historical Backgrou...

flag Report DMCA
Review

Anonymous
Thanks, good work

Similar Questions
Related Tags

Brown University





1271 Tutors

California Institute of Technology




2131 Tutors

Carnegie Mellon University




982 Tutors

Columbia University





1256 Tutors

Dartmouth University





2113 Tutors

Emory University





2279 Tutors

Harvard University





599 Tutors

Massachusetts Institute of Technology



2319 Tutors

New York University





1645 Tutors

Notre Dam University





1911 Tutors

Oklahoma University





2122 Tutors

Pennsylvania State University





932 Tutors

Princeton University





1211 Tutors

Stanford University





983 Tutors

University of California





1282 Tutors

Oxford University





123 Tutors

Yale University





2325 Tutors