network security and threat table, computer science homework help
Encryption uses cryptographic algorithms to obfuscate data. These complex algorithms transform data from human readable plaintext into encrypted cipher text. Encryption uses the principles of substitution and permutation to ensure that data is transformed in a non-deterministic manner by allowing the user to select the password or a key to encrypt a message. The recipient must know the key in order to decrypt the message, translating it back into the human readable plaintext.There are six steps that will lead you through this project. After beginning with the workplace scenario, continue to Step 1: "IT Systems Architecture."The deliverables for this project are as follows:Create a single report in Word document format. This report should be about 10 pages long, double-spaced, with citations in APA format. Page count does not include diagrams or tables. The report must cover the following:network security and threat tableCommon Access Card deployment strategye-mail security strategyIn a Word document, share your lab experience and provide screenshots to demonstrate that you performed the lab.When you submit your project, your work will be evaluated using the competencies listed below. You can use the list below to self-check your work before submission.1.5: Use sentence structure appropriate to the task, message and audience.1.6: Follow conventions of Standard Written English.1.7: Create neat and professional-looking documents appropriate for the project.2.1: Identify and clearly explain the issue, question, problem under consideration.2.2: Locate and access sufficient information to investigate the issue or problem.2.3: Evaluate the information in logical manner to determine value and relevance.2.4: Consider and analyze information in context to the issue or problem.3.2: Employ quantitative and data analysis techniques to arrive at optimal solution.5.1: Knowledge of procedures, tools, and applications used to keep data or information secure, including public key infrastructure, point-to-point encryption, and smart cards.Step 2: Plan of ProtectionNote: You will utilize the tools in Workspace for this step. If you need help outside the classroom, you can register for the CLAB 699 Cyber Computing Lab Assistance (go to the Discussions List for registration information). Primary lab assistance is available from a team of lab assistants. Lab assistants are professionals and are trained to help you.Click here to access the instructions for Navigating the Workspace and the Lab Setup.Click here to access the Project 5 Workspace Exercise Instructions. Explore the tutorials and user guides to learn more about the tools you will use.You will have to provide the leadership of your organization with your plan for protecting identity, access, authorization and nonrepudiation of information transmission, storage, and usage.Research scholarly works on nonrepudiation measures and discuss options for protecting the integrity of an organization's information assets, which include files, networks, databases, and email and include this in your lab report.Next, select the following link to enter Workspace and complete the lab exercises.Step 4: Creating the Network Security Vulnerability and Threat TableUsing the information you've gathered from the previous steps, prepare the network security vulnerability and threat table, in which you outline the following:security architecture of the organizationthe cryptographic means of protecting the assets of the organizationthe types of known attacks against those types of protectionsmeans to ward off the attacksCreate your Network Security Vulnerability and Threat Table, and include it in your submission to the organization. Please refer to this threat table template for guidance on creating this document.Step 5: Access Control Based on Smart Card StrategiesSmart cards use encryption chips to identify the user, their identity, role, and sometimes use their personal identifiable information (PII). Two examples of smart cards are the federal government’s use of common access cards (CACs), and the financial sector’s use of encryption chips in credit cards.You have completed your threat table, and you've decided that you want to modernize the access control methods for your organization. To that end, you read the following resources to gather some background information on access control and the various encryption schemas associated with the Common Access Card (CAC):Access controlCommon access Card (CAC)You plan to deploy CAC to the company and you are tasked with devising that CAC deployment strategy, which includes the cryptographic solutions used with the CAC.In the Common Access Card Deployment Strategy final deliverable, describe how identity management would be a part of your overall security program and your CAC deployment plan:Create your Common Access Card Deployment Strategy and include it in your submission to the organization.Step 6: The Email Security StrategyAfter completing the CAC, your next step is to build the Secure Email Strategy for the organization. You will present this tool to your leadership.Provide an overview of the types of public-private key pairing, and show how this provides authentication and nonrepudiation. You will also add hashing, and describe how this added security benefit ensures the integrity of messaging.Begin preparing your strategy by reviewing the following resources that will aid you in becoming well informed on encryption technologies for e-mail:Public Key Infrastructure (PKI)iOS encryptionBlackberry encryptionThen start developing your strategy. Define these strong encryption technologies as general principles in secure email:Pretty Good Policy (PGP algorithm)GNU Privacy Guard (GPG)Public Key Infrastructure (PKI)Digital signatureMobile device encryption (e.g., iOS encryption and Blackberry encryption)In your report, also consider how the use of smart card readers tied to computer systems might be beneficial in the future enhancements to system and data access protection. This may help you define long-term solutions for your leadership.Leadership does not know the costs and technical complexity of these email encryption strategies. To further their understanding, compare the complexities of each in relation to the security benefits, and then make a recommendation and a deployment plan.The deliverables for this project are as follows:Create a single report in Word document format. This report should be about 10 pages long, double-spaced, with citations in APA format. Page count does not include diagrams or tables. The report must cover the following:network security and threat tableCommon Access Card deployment strategye-mail security strategyIn a Word document, share your lab experience and provide screenshots to demonstrate that you performed the lab.Submit your deliverables to the assignment folder.Before you submit your assignment, review the competencies below, which your instructor will use to evaluate your work. A good practice would be to use each competency as a self-check to confirm you have incorporated all of them in your work.1.5: Use sentence structure appropriate to the task, message and audience.1.6: Follow conventions of Standard Written English.1.7: Create neat and professional-looking documents appropriate for the project.2.1: Identify and clearly explain the issue, question, problem under consideration.2.2: Locate and access sufficient information to investigate the issue or problem.2.3: Evaluate the information in logical manner to determine value and relevance.2.4: Consider and analyze information in context to the issue or problem.3.2: Employ quantitative and data analysis techniques to arrive at optimal solution.5.1: Knowledge of procedures, tools, and applications used to keep data or information secure, including public key infrastructure, point-to-point encryption, and smart cards.