Define cryptography method to ensure vital data is encrypted

Assignment Help Computer Engineering
Reference no: EM132109777

Question: XYZ Corporation is a small organization of roughly 20 to 30 employees working in a simple office space using basic peer-to-peer type networking in which all employees keep their data on their own PCs and each has his or her own devices (i.e., printers, scanners, and other peripherals).

In the last few months, XYZ developed a revolutionary widget that will change technology as we know it. The company received a substantial investment and will quickly ramp up to 100 employees. They moved into a new building that was wired and set up for a local area network (LAN). They have implemented a client server-based network in which all printers, folders, and other resources are shared but everyone has access to everything and there is no security outside of the defaults in place when the system was set up.

You have been hired to secure XYZ Inc's network and ensure that the company has the highest levels of security to prevent internal or external attacks. In an 8-10 page proposal, address the following items to provide a comprehensive secure environment:

1. A plan to provide secure Access Control Methods for all user access

2. A viable Password policy, which includes complexity, duration, and history requirements

3. A cryptography method to ensure vital data is encrypted

4. A remote access plan to ensure that users that access the network remotely do so in a secure and efficient manner

5. A thorough plan to protect the network from Malware and other Malicious attacks

Your proposal should address all of the elements noted above with support, detail, and elaboration for each section explicitly grounded in knowledge from the assigned readings and media, along with any outside sources you may choose to bring into your writing. Your paper should be 8-10 pages in length, conform to CSU-Global Guide to Writing and APA, and include 3-5 scholarly references in addition to the course textbook to support your views. The CSU-Global Library is a good place to find these references.

Reference no: EM132109777

Questions Cloud

Explain the environmental philosophy of patagonia : Explain the environmental philosophy of Patagonia. Explain what your key metrics would be to evaluate the success of executing on this philosophy?
Critique the strategy applied by the firm : assessment is to enable students to undertake research and to present that research along with recommendations to an audience
Global companies with greatest commitment to sustainability : The GlobeScan-SustainAbility Survey announced that Interface lead their list of global companies with the greatest commitment to sustainability.
What is the expected total overhead cost for next month : If Two Sisters Catering has 865 hours scheduled for next month, what is the expected total overhead cost for next month
Define cryptography method to ensure vital data is encrypted : XYZ Corporation is a small organization of roughly 20 to 30 employees working in a simple office space using basic peer-to-peer type networking.
Identify recent economic-social and technological trend : Identify a recent economic, social, political, or technological trend that significantly affects financial institutions.
What are the challenges of securing information : Create a 7-10- slide PowerPoint Presentation on the challenges of securing information, and list some of today's information security attacks.
Probabilities-dichotomous events : What is the probability that Jane's eleventh flip will land on heads as well?
Describe the evolution of cryptography : Compare and contrast the characteristics of classic and modern cryptography. (Maximum: Half a Page, double-spaced). Describe the evolution of cryptography.

Reviews

Write a Review

Computer Engineering Questions & Answers

  Mathematics in computing

Binary search tree, and postorder and preorder traversal Determine the shortest path in Graph

  Ict governance

ICT is defined as the term of Information and communication technologies, it is diverse set of technical tools and resources used by the government agencies to communicate and produce, circulate, store, and manage all information.

  Implementation of memory management

Assignment covers the following eight topics and explore the implementation of memory management, processes and threads.

  Realize business and organizational data storage

Realize business and organizational data storage and fast access times are much more important than they have ever been. Compare and contrast magnetic tapes, magnetic disks, optical discs

  What is the protocol overhead

What are the advantages of using a compiled language over an interpreted one? Under what circumstances would you select to use an interpreted language?

  Implementation of memory management

Paper describes about memory management. How memory is used in executing programs and its critical support for applications.

  Define open and closed loop control systems

Define open and closed loop cotrol systems.Explain difference between time varying and time invariant control system wth suitable example.

  Prepare a proposal to deploy windows server

Prepare a proposal to deploy Windows Server onto an existing network based on the provided scenario.

  Security policy document project

Analyze security requirements and develop a security policy

  Write a procedure that produces independent stack objects

Write a procedure (make-stack) that produces independent stack objects, using a message-passing style, e.g.

  Define a suitable functional unit

Define a suitable functional unit for a comparative study between two different types of paint.

  Calculate yield to maturity and bond prices

Calculate yield to maturity (YTM) and bond prices

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd