Create a digital key certificate for client and server

Assignment Help Computer Engineering
Reference no: EM133473937

Implement secure encryption technologies

Assessment Task: Project

Activity 1 (Installing encryption software)
You have received a final approval from David to start an encryption project, so you must perform the installation of encryption software and tools on the live network.
Assume yourself as "Lee" and install database encryption software and tools.
You need to install encryption software on IT Server. You need to Perform installation of database "Encryption" software by adhering below mention conditions.
a) Use secure protocol for data transfer
b) Create a digital key certificate for client and server
c) Use secure network protocols
d) Set admin password

Activity 2: (Analysing effect of encryption on user roles)

Note: This activity is in continuation of activity 1.
Assume that Lee has implemented the encryption software successfully. As a part of his responsibilities, he needs to analyse the effect of user roles and responsibilities.
Assume yourself as Lee and you are required to analyse the effect of user roles and responsibilities in encryption and complete the following "security plan" template

Activity 3: (Role Play - Informing users about their roles)

Note: This activity is in continuation of activity 2.
o Time allowed for this activity is 10-15 minutes.
Assume that you are still playing the role of Lee and participate in the following role play.
The purpose of the role play is to inform users about new encryption technology and how it works. Explain the effects of new encryption technology on user responsibilities. You need to use the template that you have developed in the assessment activity 2 (Assessment task

3) to explain the effects of new encryption technology on user responsibilities for the following users:
o Policy administrator
o Enterprise Authenticator
o Policy authenticator
o User

Your trainer/assessor will act as enterprise administrator and will ask you the following questions:

1. Security limitations of all the roles

2. Explanation of the features included in the "Enterprise administrator" role
Following the role play, complete minutes of meeting template with details of what was discussed.

Activity 4: (Analysing functioning of "Encryption software")

Assuming that you have implemented the encryption technology and tools in a live server in the previous assessment activities, you are required to monitor the encryption in this activity. You need to complete this task in 1 to 2 hours.
In this activity you need to monitor the functioning of "Encryption software" by perform following tasks in a live server.

1. Analyse the implementation of encryption technology to confirm its functioning by:
o Monitoring digital signature
o Monitoring Data Encryption Compromising Network Performance
o Monitoring network performance

2. Analyse helpdesk records for errors occurred and security compromises in encryption and print these records as a part of this activity.

3. Check local computer security logs for encryption issues and print it as a part of this activity.

4. You need write a note on encryption issue and security compromises included error logs and network performance issues identified in the task and submit to your trainer/assessor.

Reference no: EM133473937

Questions Cloud

Describe what life-course criminology : Describe what life-course criminology is and how it helps to explain criminal behavior.
What is your assessment of effectiveness of counselor : What is your assessment of the effectiveness of the counselor and the accuracy of her understanding of the client's issues?
Discuss sick leave vacation leave and the necessary notice : Make sure that you discuss sick leave, vacation leave, and the necessary notice that the employer requires.
Police-citizen encounters and police activity : Identify a problem statement based on "The effects of body-worn cameras on police-citizen encounters and police activity:
Create a digital key certificate for client and server : ICTNWK537 Implement secure encryption technologies, Australian Harbour International College - Analyse helpdesk records for errors occurred
Do you think that joint commissin standards : Do you think that Joint Commissin standards keep the staff from doing things that aren't safe for the patients? Do the standards hold them to a higher standard?
Discuss health and safety issues : With a partner, discuss health and safety issues and concerns that might prompt you to report them to a supervisor or HSR.
Domestic violence offender rehabilitation treatment program : Provide an overview of an evidence-based domestic violence offender rehabilitation treatment program.
Correlate well with success or failure on probation : Research has identified a number of variables that correlate well with success or failure on probation,

Reviews

Write a Review

Computer Engineering Questions & Answers

  What instructions are privileged

Why does the 68000 have a supervisor mode (in contrast to many 8-bit microprocessors)? What instructions are privileged.

  Why should an organization implement an erm application

Risk management is one of the most important components in empowering an organization to achieve its ultimate vision. With proper risk management culture.

  Find counter examples to each of these statements

if a = b(mod m) and c=d(mod m); a,b,c,d,m are integers; c,d>0 and m=> 2, then a^c = b^d(mod m)[note: every = should be triple equal]

  What would you do in your program to avoid the pitfalls

CIS Discussion: Text File Processing- What would you do in your program to avoid these pitfalls when working with text file in your program?

  Write vulnerabilities from each component of wamp

ITST 2258 Columbus State Community College Section will focus on the LAMP stack and 2 vulnerabilities from each component of WAMP Can you write 2

  Write a program to retrieve the values from the text file

Use Notepad to place 20 integer values in a text file. Write a C# program to retrieve the values from the text file.

  Display the list of positional parameter

Set the positional parameters to be the output of the date.Display the list of positional parameter.

  Determine the minimum services that must be maintained

Determine the minimum services that must be maintained for that company after a disaster. What services should be restored first?

  Frame problem of traveling one city to another as production

Explain how problem of traveling from one city in one country to another city, located in another country, could be framed as a production system. What are the states? What are the productions?

  Identify urls for that you think do particularly good job

Find and view several online videos on unified communications. Identify the URLs for three that you think do a particularly good job illustrating.

  Which kind of disk technology you want to use for installing

Use Chapter 5 slides to find the answer to this question, you may have to research some of the topics if you are not familiar, but the concept you are looking

  Explain how a bitmapped image is device-dependent

Explain how a bitmapped image is device-dependent? What are the major tasks to be preferred to execute digital video editing operations by the professionals?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd