Network Security and Vulnerability Threats Assignment
Network Security and Vulnerability Threats Template
You will identify the IT system assets of the system architecture of your organization.These can be fictitious or modeled after existing architectures. Be sure to cite using APA format. You will identify threats and vulnerabilities to IT system assets and the security mechanisms used to address them.
|IT System Assets||Threats and Vulnerabilities||Security Mechanisms to Address Threats and Vulnerabilities|
Choose a fictitious organization and create a network security and vulnerability threat table. Include and define the following components of security in the architecture of the organization, and explain if threats to these components are likely, or unlikely:
- LAN security
- Identify management
- Physical security
- Personal security
Review different types of cyberattacks. Take notes of which cyberattacks are most likely to affect your organization. Then list the security defenses you employ in your organization to mitigate these types of attacks. Include this information in the Network Security and Vulnerability Threat Table.
You will describe to the organization the various cryptographic means of protecting its assets. Provide the organization with a brief overview of each.
- Shift/ Caesar cipher
- Polyalphabetic cipher
- One time pad cipher/Vernam cipher/perfect cipher
- Block cipher
- Triple DES
- Advanced Encryption Standard
- Symmetric encryption
- Text block coding
Data Hiding Technologies
- Information hiding and steganography
- Digital watermarking
- Masks and filtering
These descriptions will be included in the network security vulnerability and threat table.
Creating the Network security vulnerability and threat table
Using the information that was gathering above, fill out the network security vulnerability and threat table, in which outline the following
- Security architecture of the organization
- The cryptographic means of protecting the assets of the organization
- The types of know attacks against those types of protections
- Means to ward off the attacks
You have completed your threat table, and you’ve decided that you want to modernize the access control methods for your organization.
- Access control
- Common access Card (CAC)
You plan to deploy CAC to the company and you are tasked with devising that CAC deployment strategy, which includes the cryptographic solutions used with the CAC.
In the Common Access Card Deployment Strategy final deliverable, describe how identity management would be a part of your overall security program and your CAC deployment plan:
Create your Common Access Card Deployment Strategy and include it in your submission to the organization.
After completing the CAC, your next step is to build the Secure Email Strategy for the organization. You will present this tool to your leadership.
Provide an overview of the types of public-private key pairing, and show how this provides authentication and nonrepudiation. You will also add hashing, and describe how this added security benefit ensures the integrity of messaging.
Begin preparing your strategy by reviewing the following resources that will aid you in becoming well informed on encryption technologies for e-mail:
- Public Key Infrastructure (PKI)
- iOS encryption
- Blackberry encryption
Then start developing your strategy. Define these strong encryption technologies as general principles in secure email:
Pretty Good Policy (PGP algorithm)
- GNU Privacy Guard (GPG)
- Public Key Infrastructure (PKI)
- Digital signature
- Mobile device encryption (e.g., iOS encryption and Blackberry encryption)
Leadership does not know the costs and technical complexity of these email encryption strategies. To further their understanding, compare the complexities of each in relation to the security benefits, and then make a recommendation and a deployment plan.
Create a single report in Word document format. This report should be about 10 pages long, double-spaced, with citations in APA format. Page count does not include diagrams or tables. The report must cover the following:
- network security and threat table
- Common Access Card deployment strategy
- e-mail security strategy
Last Updated on July 19, 2020 by Essay Pro