information technology, computer science homework help

User Generated

gnzgbf

Computer Science

Description

In a managers’ meeting between the information technology administrator, the lead for the consultant group, and the dean of information technology, it is apparent that a review of the computer and network infrastructure has not been done for a year concerning the use of cryptography and distributed system authentication. The dean of IT has asked for a checklist provided to the university recommending the security hardware and software needed to secure organizational computer systems. The recommendation should include the correct cryptographic algorithms and devices that must be deployed to secure the organizational network. The checklist should address the following:

  • Hardware and software
  • Skill sets needed for the implementation of security and authentication mechanisms
  • Policies needed relative to encryption and decryption
  • Comparisons between cryptography, hashing, symmetric encryption, asymmetric encryption, and public key infrastructure (PKI)

Be sure to document your references using APA format

User generated content is uploaded by users for the purposes of learning and should be used following Studypool's honor code & terms of service.

Explanation & Answer

Attached.

Computer and Network Review - Outline
Thesis Statement: A systems review of computer and network infrastructure ensures that the
system is up-to-date and that the data security measures are secure.
I. Introduction
II. Hardware and Software
A. Hardware
B. Software
III. Skills set
IV. Encryption and decryption policies
V. Cryptography
A. Symmetric
B. Asymmetric
C. Hashing
VI. Conclusion


Running head: COMPUTER AND NETWORK REVIEW

Computer and Network Review
Name
Institution

1

COMPUTER AND NETWORK REVIEW

2

Computer and Network Review
The core focus of reviewing the computer and network infrastructure of a company is
ensuring that the information systems are up to date and the information security is assured. For
instance, the checking of such systems could ensure that the systems are secure from any data
breaches and security upsets. As such, to secure the systems from such malicious intrusions and
ensure that the efficiency of the systems is up-to-date with the current technology, it is necessary...


Anonymous
Just what I needed…Fantastic!

Studypool
4.7
Trustpilot
4.5
Sitejabber
4.4

Related Tags