08 Jul Graduate Level Writing!!! Cyber/Computer Security Only!!!
1. Please take a look at the “Project 5 Instructions” that is attached (pay close attention to what’s highlighted in “green”). The paper must meet these requirements in order to receive a “grade of meet requirements”.
2. Will pay up to $100.
3. If any other resources is needed please let me know.
4. Begin preparing your strategy by reviewing the following resources that will aid you in becoming well informed on encryption technologies for e-mail:
- Public Key Infrastructure (PKI)
- iOS encryption
- Blackberry encryption
Then start developing your strategy. Define these strong encryption technologies as general principles in secure email:
- Pretty Good Policy (PGP algorithm)
- GNU Privacy Guard (GPG)
- Public Key Infrastructure (PKI)
- Digital signature
- Mobile device encryption (e.g., iOS encryption and Blackberry encryption)
In your report, also consider how the use of smart card readers tied to computer systems might be beneficial in the future enhancements to system and data access protection. This may help you define long-term solutions for your leadership.
Leadership does not know the costs and technical complexity of these email encryption strategies. To further their understanding, compare the complexities of each in relation to the security benefits, and then make a recommendation and a deployment plan.
The deliverables for this project are as follows:
1. Create a single report in Word document format. This report should be about 10 pages long, double-spaced, with citations in APA format. Page count does not include diagrams or tables. The report must cover the following:
- · network security and threat table
- · Common Access Card deployment strategy
- · e-mail security strategy
2. Using the information you’ve gathered from the previous steps, prepare the network security vulnerability and threat table,in which you outline the following:
- · security architecture of the organization
- · the cryptographic means of protecting the assets of the organization
- · the types of known attacks against those types of protections
- · means to ward off the attacks
Create your Network Security Vulnerability and Threat Table, and include it in your submission to the organization. Please refer to this threat table template (See page 3) for guidance on creating this document.
***A good practice would be to use each competency as a self-check to confirm you have incorporated all of them in your work.***
- 1.5: Use sentence structure appropriate to the task, message and audience.
- 1.6: Follow conventions of Standard Written English.
- 1.7: Create neat and professional-looking documents appropriate for the project.
- 2.1: Identify and clearly explain the issue, question, problem under consideration.
- 2.2: Locate and access sufficient information to investigate the issue or problem.
- 2.3: Evaluate the information in logical manner to determine value and relevance.
- 2.4: Consider and analyze information in context to the issue or problem.
- 3.2: Employ quantitative and data analysis techniques to arrive at optimal solution.
- 5.1: Knowledge of procedures, tools, and applications used to keep data or information secure, including public key infrastructure, point-to-point encryption, and smart cards.
Our website has a team of professional writers who can help you write any of your homework. They will write your papers from scratch. We also have a team of editors just to make sure all papers are of HIGH QUALITY & PLAGIARISM FREE. To make an Order you only need to click Ask A Question and we will direct you to our Order Page at WriteDemy. Then fill Our Order Form with all your assignment instructions. Select your deadline and pay for your paper. You will get it few hours before your set deadline.
Fill in all the assignment paper details that are required in the order form with the standard information being the page count, deadline, academic level and type of paper. It is advisable to have this information at hand so that you can quickly fill in the necessary information needed in the form for the essay writer to be immediately assigned to your writing project. Make payment for the custom essay order to enable us to assign a suitable writer to your order. Payments are made through Paypal on a secured billing page. Finally, sit back and relax.
About Writedemy
We are a professional paper writing website. If you have searched a question and bumped into our website just know you are in the right place to get help in your coursework. We offer HIGH QUALITY & PLAGIARISM FREE Papers.
How It Works
To make an Order you only need to click on “Order Now” and we will direct you to our Order Page. Fill Our Order Form with all your assignment instructions. Select your deadline and pay for your paper. You will get it few hours before your set deadline.
Are there Discounts?
All new clients are eligible for 20% off in their first Order. Our payment method is safe and secure.
