Define cryptography method to ensure vital data is encrypted

Assignment Help Computer Engineering
Reference no: EM132109777

Question: XYZ Corporation is a small organization of roughly 20 to 30 employees working in a simple office space using basic peer-to-peer type networking in which all employees keep their data on their own PCs and each has his or her own devices (i.e., printers, scanners, and other peripherals).

In the last few months, XYZ developed a revolutionary widget that will change technology as we know it. The company received a substantial investment and will quickly ramp up to 100 employees. They moved into a new building that was wired and set up for a local area network (LAN). They have implemented a client server-based network in which all printers, folders, and other resources are shared but everyone has access to everything and there is no security outside of the defaults in place when the system was set up.

You have been hired to secure XYZ Inc's network and ensure that the company has the highest levels of security to prevent internal or external attacks. In an 8-10 page proposal, address the following items to provide a comprehensive secure environment:

1. A plan to provide secure Access Control Methods for all user access

2. A viable Password policy, which includes complexity, duration, and history requirements

3. A cryptography method to ensure vital data is encrypted

4. A remote access plan to ensure that users that access the network remotely do so in a secure and efficient manner

5. A thorough plan to protect the network from Malware and other Malicious attacks

Your proposal should address all of the elements noted above with support, detail, and elaboration for each section explicitly grounded in knowledge from the assigned readings and media, along with any outside sources you may choose to bring into your writing. Your paper should be 8-10 pages in length, conform to CSU-Global Guide to Writing and APA, and include 3-5 scholarly references in addition to the course textbook to support your views. The CSU-Global Library is a good place to find these references.

Reference no: EM132109777

Questions Cloud

Explain the environmental philosophy of patagonia : Explain the environmental philosophy of Patagonia. Explain what your key metrics would be to evaluate the success of executing on this philosophy?
Critique the strategy applied by the firm : assessment is to enable students to undertake research and to present that research along with recommendations to an audience
Global companies with greatest commitment to sustainability : The GlobeScan-SustainAbility Survey announced that Interface lead their list of global companies with the greatest commitment to sustainability.
What is the expected total overhead cost for next month : If Two Sisters Catering has 865 hours scheduled for next month, what is the expected total overhead cost for next month
Define cryptography method to ensure vital data is encrypted : XYZ Corporation is a small organization of roughly 20 to 30 employees working in a simple office space using basic peer-to-peer type networking.
Identify recent economic-social and technological trend : Identify a recent economic, social, political, or technological trend that significantly affects financial institutions.
What are the challenges of securing information : Create a 7-10- slide PowerPoint Presentation on the challenges of securing information, and list some of today's information security attacks.
Probabilities-dichotomous events : What is the probability that Jane's eleventh flip will land on heads as well?
Describe the evolution of cryptography : Compare and contrast the characteristics of classic and modern cryptography. (Maximum: Half a Page, double-spaced). Describe the evolution of cryptography.

Reviews

Write a Review

Computer Engineering Questions & Answers

  Program to print the chain of numbers

Write down the program that prints out the chains for numbers within the range which the user specifies. The length of each chain must be printed at the end of the chain.

  Query using an update statement

Here is issue, a table namedPoints varchar(81) has values stored in a column named Point. There are two columns in the Points table, X and Y.

  Write a backtracking program that input an initial position

Write a backtracking program that will input an initial position and search for a knight's tour starting at the given position and going to every square once.

  Consumer protection view

The free market view and The consumer protection view.

  What are synchronized methods and synchronized statements

What are synchronized methods and synchronized statements? What are different ways in which a thread can enter the waiting state?

  How eve decide substitution or transposition cipher was used

How can Eve decide whether a substitution or a transposition cipher was used? How can she decide whether it was an additive, multiplicative, or affine cipher?

  Explains the value of information to the organisation

with references to similar cases available in journals which explains the value of this information to the organisation

  How disaster recovery planning ensure business continuity

Write a 2-3 page paper that fully answers the following questions and supports your opinion. How does disaster recovery planning ensure business continuity?

  Explain the main difference between dfa and dfm

Explain the main difference between DFA and DFM. how many axes are available, turning operations, turning cutting tools and speeds.

  Create an essay describing the maintenance mode

Create an essay describing the Maintenance Mode. Include each of the model's five domains and explain why each domain is important

  Description in the last episode of the mafghanistan trilogy

description in the last episode of the mafghanistan trilogy the mamerican forces invaded liberated mafghanistan in

  Define the term static connection networks

Define the terms Static connection networks, Dynamic connection networks, Non-blocking networks, multicast and broadcast and Mesh versus torus.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd