{br} STUCK with your assignment? {br} When is it due? {br} Get FREE assistance. Page Title: {title}{br} Page URL: {url}
UK: +44 748 007-0908, USA: +1 917 810-5386 [email protected]

 

In your report, also consider how the use of smart card readers tied to computer systems might be beneficial in future enhancements to system and data access protection. This may help you define long-term solutions for your leadership.
Leadership does not know the costs and technical complexity of these email encryption strategies. To further their understanding, compare the complexities of each in relation to the security benefits, and then make a recommendation and a deployment plan.
The deliverables for this project are as follows:
1. Create a single report in Word document format. This report should be about 10 pages long, double-spaced, with citations in APA format. Page count does not include diagrams or tables. The report must cover the following:
o network security and threat table
o Common Access Card deployment strategy
o email security strategy

Topic: Cryptography
I. Introduction
II. IT Systems Architecture
a. LAN Security
b. Identity Management
c. Physical Security
d. Personal Security
e. Availability
f. Privacy
g. Cyberattacks
i. List the attacks likely to affect the organization
ii. What security defenses we use to mitigate these attacks

III. Data Hiding Technologies
a. Hiding Technologies
i. Information Hiding
ii. Digital Watermarking
iii. Masking and Filtering
b. Encryption Technologies
i. Shift/Caesar Cipher
ii. Polyalphabetic Cipher
iii. One-time pad cipher/Vernam cipher/perfect cipher
iv. Block Ciphers
v. Triple DES
vi. RSA
vii. Advanced Encryption Standard (AES)
viii. Symmetric Encryption
ix. Texture Block Coding

IV. Plan of Protection
a. Steganography
b. Explain how an organization can monitor, identify, and remedy embedded files
c. Provide recommendations to include nonrepudiation options
d. Explain the plan to protect identity, access, authorization and nonrepudiation of information transmission, storage and usage

V. Common Access Card deployment strategy
a.

VI. Email Security strategy
a.

VII. Conclusion

 

This question has been answered.

Get Answer
WeCreativez WhatsApp Support
Our customer support team is here to answer your questions. Ask us anything!
👋 Hi, how can I help?