Create a digital key certificate for client and server

Assignment Help Computer Engineering
Reference no: EM133473937

Implement secure encryption technologies

Assessment Task: Project

Activity 1 (Installing encryption software)
You have received a final approval from David to start an encryption project, so you must perform the installation of encryption software and tools on the live network.
Assume yourself as "Lee" and install database encryption software and tools.
You need to install encryption software on IT Server. You need to Perform installation of database "Encryption" software by adhering below mention conditions.
a) Use secure protocol for data transfer
b) Create a digital key certificate for client and server
c) Use secure network protocols
d) Set admin password

Activity 2: (Analysing effect of encryption on user roles)

Note: This activity is in continuation of activity 1.
Assume that Lee has implemented the encryption software successfully. As a part of his responsibilities, he needs to analyse the effect of user roles and responsibilities.
Assume yourself as Lee and you are required to analyse the effect of user roles and responsibilities in encryption and complete the following "security plan" template

Activity 3: (Role Play - Informing users about their roles)

Note: This activity is in continuation of activity 2.
o Time allowed for this activity is 10-15 minutes.
Assume that you are still playing the role of Lee and participate in the following role play.
The purpose of the role play is to inform users about new encryption technology and how it works. Explain the effects of new encryption technology on user responsibilities. You need to use the template that you have developed in the assessment activity 2 (Assessment task

3) to explain the effects of new encryption technology on user responsibilities for the following users:
o Policy administrator
o Enterprise Authenticator
o Policy authenticator
o User

Your trainer/assessor will act as enterprise administrator and will ask you the following questions:

1. Security limitations of all the roles

2. Explanation of the features included in the "Enterprise administrator" role
Following the role play, complete minutes of meeting template with details of what was discussed.

Activity 4: (Analysing functioning of "Encryption software")

Assuming that you have implemented the encryption technology and tools in a live server in the previous assessment activities, you are required to monitor the encryption in this activity. You need to complete this task in 1 to 2 hours.
In this activity you need to monitor the functioning of "Encryption software" by perform following tasks in a live server.

1. Analyse the implementation of encryption technology to confirm its functioning by:
o Monitoring digital signature
o Monitoring Data Encryption Compromising Network Performance
o Monitoring network performance

2. Analyse helpdesk records for errors occurred and security compromises in encryption and print these records as a part of this activity.

3. Check local computer security logs for encryption issues and print it as a part of this activity.

4. You need write a note on encryption issue and security compromises included error logs and network performance issues identified in the task and submit to your trainer/assessor.

Reference no: EM133473937

Questions Cloud

Describe what life-course criminology : Describe what life-course criminology is and how it helps to explain criminal behavior.
What is your assessment of effectiveness of counselor : What is your assessment of the effectiveness of the counselor and the accuracy of her understanding of the client's issues?
Discuss sick leave vacation leave and the necessary notice : Make sure that you discuss sick leave, vacation leave, and the necessary notice that the employer requires.
Police-citizen encounters and police activity : Identify a problem statement based on "The effects of body-worn cameras on police-citizen encounters and police activity:
Create a digital key certificate for client and server : ICTNWK537 Implement secure encryption technologies, Australian Harbour International College - Analyse helpdesk records for errors occurred
Do you think that joint commissin standards : Do you think that Joint Commissin standards keep the staff from doing things that aren't safe for the patients? Do the standards hold them to a higher standard?
Discuss health and safety issues : With a partner, discuss health and safety issues and concerns that might prompt you to report them to a supervisor or HSR.
Domestic violence offender rehabilitation treatment program : Provide an overview of an evidence-based domestic violence offender rehabilitation treatment program.
Correlate well with success or failure on probation : Research has identified a number of variables that correlate well with success or failure on probation,

Reviews

Write a Review

Computer Engineering Questions & Answers

  Mathematics in computing

Binary search tree, and postorder and preorder traversal Determine the shortest path in Graph

  Ict governance

ICT is defined as the term of Information and communication technologies, it is diverse set of technical tools and resources used by the government agencies to communicate and produce, circulate, store, and manage all information.

  Implementation of memory management

Assignment covers the following eight topics and explore the implementation of memory management, processes and threads.

  Realize business and organizational data storage

Realize business and organizational data storage and fast access times are much more important than they have ever been. Compare and contrast magnetic tapes, magnetic disks, optical discs

  What is the protocol overhead

What are the advantages of using a compiled language over an interpreted one? Under what circumstances would you select to use an interpreted language?

  Implementation of memory management

Paper describes about memory management. How memory is used in executing programs and its critical support for applications.

  Define open and closed loop control systems

Define open and closed loop cotrol systems.Explain difference between time varying and time invariant control system wth suitable example.

  Prepare a proposal to deploy windows server

Prepare a proposal to deploy Windows Server onto an existing network based on the provided scenario.

  Security policy document project

Analyze security requirements and develop a security policy

  Write a procedure that produces independent stack objects

Write a procedure (make-stack) that produces independent stack objects, using a message-passing style, e.g.

  Define a suitable functional unit

Define a suitable functional unit for a comparative study between two different types of paint.

  Calculate yield to maturity and bond prices

Calculate yield to maturity (YTM) and bond prices

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd