Graduate Level Writing!!! Cyber/Computer Security Only!!!
CYB610 Project 5 You are an enterprise secu rity arch it e ct fo r a co mp any in a se mico nduct or m anufa ct urin g industry where maintaining co mp etit ive a dva nta ge a nd p ro te ct in g in te lle ct ual p ro perty is vita l.
You're in charge of securi ty opera tio ns and st ra te gic se curity pla nnin g. Y our r e sp onsi bilit ie s include devising the securi ty pro to co ls fo r id entif ica tio n, a cce ss, a nd a uth oriza tio n m anagem ent.
You recently implemente d cryp to gra phy alg orith ms to p ro te ct th e in fo rm atio n o rg aniza tio n.
Leadership is pleased wit h yo ur effo rt s and w ould like yo u to ta ke p ro te ct io n m eth ods eve n further. They've asked you to st udy cyb era tta cks again st d if fe re nt cr yp to gra phy m ech anism s and deploy access contro l p ro gra ms to p re ve nt th ose typ es of a tta cks.
We'd like you to create p la ns fo r fu tu re se curity te ch nolo gy deplo ym ents, sa ys one se nio r manager. And provide docu menta tio n so th at o th ers can ca rry out th e d eplo ym ents. A d ir e ct or chimes in, but you should also d evi se a me th od fo r ensu rin g th e id entif ica tio n, in te grit y, a nd nonrepudiation of inform atio n in tra nsi t a t re st a nd in u se w it h in th e o rg aniza tio n.
As the enterprise security a rch it e ct , yo u a re re sp onsi ble fo r pro vidin g th e fo llo w in g d elive ra ble s.
Create a network security vuln era bilit y and th re at ta ble in w hich yo u o utlin e th e se curit y architecture of the organi zatio n, th e cryp to gra phic me ans of p ro te ct in g th e a sse ts of th e organizations, the types o f kn ow n a tta cks again st th ose p ro te ct io ns, a nd m eans to w ard o ff th e attacks. This document wi ll h elp yo u ma nage th e cu rre nt co nfig ura tio n o f th e se curit y architecture. Create a Common Access Card , C AC d eplo yme nt st ra te gy, in w hich yo u d escr ib e th e C AC implementation and deployme nt a nd e ncryp tio n me th odolo gy fo r in fo rm atio n se curit y professionals. Create an e mail se curity stra te gy in w hich yo u p ro vide th e p ublic ke y, p riva te ke y hashing methodology to d ete rmi ne th e b est ke y ma nageme nt syst em fo r yo ur o rg aniza tio n.
These documents will pro vide a se curity ove rview fo r th e le aders hip in yo ur co mpany.