Essay Writer » Essay Blog » Computer Science Essays Help » Network Security and Vulnerability Threats

Network Security and Vulnerability Threats

Network Security and Vulnerability Threats Assignment

Network Security and Vulnerability Threats Template

You will identify the IT system assets of the system architecture of your organization.These can be fictitious or modeled after existing architectures. Be sure to cite using APA format. You will identify threats and vulnerabilities to IT system assets and the security mechanisms used to address them.

 

 

IT System AssetsThreats and VulnerabilitiesSecurity Mechanisms to Address Threats and Vulnerabilities

 

Choose a fictitious organization and create a network security and vulnerability threat table. Include and define the following components of security in the architecture of the organization, and explain if threats to these components are likely, or unlikely:

 

  • LAN security
  • Identify management
  • Physical security
  • Personal security
  • Availability
  • Privacy

Review different types of cyberattacks. Take notes of which cyberattacks are most likely to affect your organization. Then list the security defenses you employ in your organization to mitigate these types of attacks. Include this information in the Network Security and Vulnerability Threat Table.

You will describe to the organization the various cryptographic means of protecting its assets. Provide the organization with a brief overview of each.

Encryption Technologies

  • Shift/ Caesar cipher
  • Polyalphabetic cipher
  • One time pad cipher/Vernam cipher/perfect cipher
  • Block cipher
  • Triple DES
  • RSA
  • Advanced Encryption Standard
  • Symmetric encryption
  • Text block coding

 

Data Hiding Technologies

  • Information hiding and steganography
  • Digital watermarking
  • Masks and filtering

 

These descriptions will be included in the network security vulnerability and threat table.

 

Creating the Network security vulnerability and threat table

 

Using the information that was gathering above, fill out the network security vulnerability and threat table, in which outline the following

  • Security architecture of the organization
  • The cryptographic means of protecting the assets of the organization
  • The types of know attacks against those types of protections
  • Means to ward off the attacks

You have completed your threat table, and you’ve decided that you want to modernize the access control methods for your organization.

  • Access control
  • Common access Card (CAC)

You plan to deploy CAC to the company and you are tasked with devising that CAC deployment strategy, which includes the cryptographic solutions used with the CAC.

In the Common Access Card Deployment Strategy final deliverable, describe how identity management would be a part of your overall security program and your CAC deployment plan:

Create your Common Access Card Deployment Strategy and include it in your submission to the organization.

What Are The Most Common Types Of Network Vulnerabilities?

After completing the CAC, your next step is to build the Secure Email Strategy for the organization. You will present this tool to your leadership.

Provide an overview of the types of public-private key pairing, and show how this provides authentication and nonrepudiation. You will also add hashing, and describe how this added security benefit ensures the integrity of messaging.

Begin preparing your strategy by reviewing the following resources that will aid you in becoming well informed on encryption technologies for e-mail:

  • Public Key Infrastructure (PKI)
  • iOS encryption
  • Blackberry encryption

Then start developing your strategy.  Define these strong encryption technologies as general principles in secure email:

Pretty Good Policy (PGP algorithm)

  • GNU Privacy Guard (GPG)
  • Public Key Infrastructure (PKI)
  • Digital signature
  • Mobile device encryption (e.g., iOS encryption and Blackberry encryption)

Leadership does not know the costs and technical complexity of these email encryption strategies. To further their understanding, compare the complexities of each in relation to the security benefits, and then make a recommendation and a deployment plan.

Create a single report in Word document format. This report should be about 10 pages long, double-spaced, with citations in APA format. Page count does not include diagrams or tables. The report must cover the following:

    • network security and threat table
    • Common Access Card deployment strategy
    • e-mail security strategy

Applied Network Security

Last Updated on July 19, 2020

Don`t copy text!
Scroll to Top