Reference no: EM133473937
Implement secure encryption technologies
Assessment Task: Project
Activity 1 (Installing encryption software)
You have received a final approval from David to start an encryption project, so you must perform the installation of encryption software and tools on the live network.
Assume yourself as "Lee" and install database encryption software and tools.
You need to install encryption software on IT Server. You need to Perform installation of database "Encryption" software by adhering below mention conditions.
a) Use secure protocol for data transfer
b) Create a digital key certificate for client and server
c) Use secure network protocols
d) Set admin password
Activity 2: (Analysing effect of encryption on user roles)
Note: This activity is in continuation of activity 1.
Assume that Lee has implemented the encryption software successfully. As a part of his responsibilities, he needs to analyse the effect of user roles and responsibilities.
Assume yourself as Lee and you are required to analyse the effect of user roles and responsibilities in encryption and complete the following "security plan" template
Activity 3: (Role Play - Informing users about their roles)
Note: This activity is in continuation of activity 2.
o Time allowed for this activity is 10-15 minutes.
Assume that you are still playing the role of Lee and participate in the following role play.
The purpose of the role play is to inform users about new encryption technology and how it works. Explain the effects of new encryption technology on user responsibilities. You need to use the template that you have developed in the assessment activity 2 (Assessment task
3) to explain the effects of new encryption technology on user responsibilities for the following users:
o Policy administrator
o Enterprise Authenticator
o Policy authenticator
o User
Your trainer/assessor will act as enterprise administrator and will ask you the following questions:
1. Security limitations of all the roles
2. Explanation of the features included in the "Enterprise administrator" role
Following the role play, complete minutes of meeting template with details of what was discussed.
Activity 4: (Analysing functioning of "Encryption software")
Assuming that you have implemented the encryption technology and tools in a live server in the previous assessment activities, you are required to monitor the encryption in this activity. You need to complete this task in 1 to 2 hours.
In this activity you need to monitor the functioning of "Encryption software" by perform following tasks in a live server.
1. Analyse the implementation of encryption technology to confirm its functioning by:
o Monitoring digital signature
o Monitoring Data Encryption Compromising Network Performance
o Monitoring network performance
2. Analyse helpdesk records for errors occurred and security compromises in encryption and print these records as a part of this activity.
3. Check local computer security logs for encryption issues and print it as a part of this activity.
4. You need write a note on encryption issue and security compromises included error logs and network performance issues identified in the task and submit to your trainer/assessor.