Preview

Unit 7 Assignment 2: Design an Encryption Strategy

Good Essays
Open Document
Open Document
406 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Unit 7 Assignment 2: Design an Encryption Strategy
Instructions:
Match common encryption algorithms and methods with the scenarios representing real-world business applications and requirements.

Common encryption algorithms and methods: ▪ Data Encryption Standard (DES) 2 ▪ Rivest, Shamir, and Adleman (RSA) encryption algorithm 4 ▪ Triple DES ▪ Diffie-Hellman key exchange 5 ▪ International Data Encryption Algorithm (IDEA) 3 ▪ El Gamal encryption algorithm ▪ Carlisle Adams and Stafford Taveres (CAST) algorithm ▪ Elliptic curve cryptography (ECC) ▪ Blowfish ▪ Secure Sockets Layer (SSL) ▪ Advanced Encryption Standard (AES) 1 ▪ Digital signature

Scenarios: 1. Shovels and Shingles is a small construction company consisting of 12 computers that have Internet access. The company's biggest concern is that a wily competitor will send e-mail messages pretending to be from Shovels and Shingles in order to get confidential information. Select an encryption solution that best prevents a competitor from receiving confidential information and justify the recommendation. 2. Top Ads is a small advertising company consisting of 12 computers that have Internet access. All employees communicate using smartphones. Top Ads' primary concern is protecting the data on the smartphones. Select an encryption solution that best protects the smartphones and justify the recommendation. 3. NetSecIT is a multinational IT services company consisting of 120,000 computers that have Internet access and 45,000 servers. All employees communicate using smartphones and e-mail. Many employees work from home and travel extensively. NetSecIT would like to implement an asymmetric general-purpose encryption technology that is very difficult to break and has a compact design so that there is not a lot of overhead. Select an encryption solution that best meets the company's needs and justify the recommendation. 4. Backordered Parts is a defense contractor that builds

You May Also Find These Documents Helpful

  • Satisfactory Essays

    First of all, glad to hear from you again after giving you some pointers regarding those interns and your merchandising team.…

    • 190 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    NT2580 Project Part 1

    • 348 Words
    • 1 Page

    Access to the company network will be secured by multiple firewalls set up with our routers. Firewall filters will be set up with a specific list of allowed users and programs. All other traffic will be blocked by default until it has been approved by IT. There will be a limited number of wireless access points around the building, with password access. These passwords will be changed on a regular basis. Access to the local network will be secured by user authentication passwords. Users will be limited to only the system resources that they absolutely need to complete their work. Users’ passwords must be changed every 90 days.…

    • 348 Words
    • 1 Page
    Satisfactory Essays
  • Powerful Essays

    Nt1310 Unit 7 Exercise 1

    • 641 Words
    • 3 Pages

    RSA is a public-key encryption algorithm and the standard for encrypting data sent over the internet. It also happens to be one of the…

    • 641 Words
    • 3 Pages
    Powerful Essays
  • Satisfactory Essays

    Unit 7 Assignment 1

    • 609 Words
    • 3 Pages

    Switched circuit- A circuit created by the phone company in reaction to signaling (the user tapping telephone keys or a modem sending in the same digits), with the telco tearing down the circuit when the user is finished.…

    • 609 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    This report gives a brief description the general security solutions planned for the safety of data and information that belongs to the organization. The outline will provide elements of a multi-layered security plan, and will indicate a general security solution for each of the seven domains of a typical IT infrastructure. Also I will describe a layer of security for each of the seven domains.…

    • 801 Words
    • 4 Pages
    Good Essays
  • Good Essays

    I have read the issues and I would recommend these steps to better manage our business workstations.…

    • 308 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    Richman Investment needs and new enterprise encryption strategy. This is for a more secure network. They are wanting to grow to 10,000 employees worldwide. Richman Investment wants to operate out of 20 different countries in the future. This is very easy to do but to have a secure network there are many things that would have to happen which will make this more difficult to do. Have a secure network takes a lot of work and has to be monitored 24 hours a day 7 days a week. There are many different ways to go about this topic the one I am going to pick is a public key infrastructure (PKI).…

    • 444 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Unit 7 Assignment 1

    • 261 Words
    • 2 Pages

    2. A pretest loop is a loop tests the conditions before performing the iteration. A posttest loop performs the iteration then test the condition.…

    • 261 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Using the table given the encryption strategy for Richmond investments would go as follows. I will be using the privacy or confidentiality objective. The basic description for the privacy or confidentiality objective is to keep information secret from all person or persons, except those who are authorized to see it have access. In other words, no one without authorization will be able to gain access to sensitive company information or client information, such as addresses, names, billing information, credit card information, and other personal information. The security option needs to be implemented on all networks in the company’s domain. The public key infrastructure is a set of hardware, software people policies and procedures needed to create, manage, distribute use store and revoke digital certificates. In this case will be using PKI cards, which will allow entrance into the facility, it will also allow entrance into specific areas of the building, allow employees to clock in and out and will allow for signing off and on of company computers. All employees will be issued a card with their name employee ID and photo on the face the card on the backside of the card will be company contact information such as departmental phone numbers, etc. the implementation of a company encryption strategy is extremely important to protect the company. The company’s clients and the overall day-to-day activities, the employees involved themselves in to keep the company running.…

    • 250 Words
    • 1 Page
    Satisfactory Essays
  • Good Essays

    NETWORKING ADMIN

    • 606 Words
    • 3 Pages

    Match common encryption algorithms and methods with the scenarios representing real-world business applications and requirements.…

    • 606 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    NT 2580 Project Part 2

    • 2096 Words
    • 9 Pages

    Issue two. Based on the premise that most of the managers have BlackBerry devices for instant communications and all employees are provided cell phones, you must research and detail the cryptography methods to protect organizational information using techniques that ensure its integrity, confidentiality, authenticity, and non-repudiation, and the recovery of encrypted information in its original form.…

    • 2096 Words
    • 9 Pages
    Powerful Essays
  • Satisfactory Essays

    lab 2

    • 398 Words
    • 2 Pages

    4. If you are using corporate e-mail for external communications that contain confidential information, what other security countermeasure can you deploy to maximize confidentiality of e-mail transmissions through the Internet?…

    • 398 Words
    • 2 Pages
    Satisfactory Essays
  • Better Essays

    Every time we have to change our index page htmls for an assignment, we have to log into our personalized servers with passwords. The reason for these passwords is because the information and permissions we have access to should be given to everyone, and therefore the information we have is encrypted from others. As it has become increasingly apparent, our everyday cyber footprint involves many interactions with some sort of encryption. Because of this, most of everything we discuss in class can be considered relevant to the importance of cryptography and/or…

    • 773 Words
    • 4 Pages
    Better Essays
  • Good Essays

    With the use of computers and networks, there is also a large focus on security. Whenever there is sensitive data being stored and transferred through computer networks, there is the risk of unauthorized individuals gaining access to this information. To lower these chances, we have several different pieces of software and also require multiple passwords that are unique to each authorized individual and a requirement to change the passwords…

    • 791 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    Unit 7 Assignment 3

    • 409 Words
    • 2 Pages

    Structuration Theory is a social theory based on several Theorists throughout time but notably Anthony Giddens. Basically Structuration Theory of our social systems stating that both structure and agents are equal in how we interact socially.…

    • 409 Words
    • 2 Pages
    Satisfactory Essays

Related Topics