Design of plan that focuses on authentication issues

Assignment Help Basic Computer Science
Reference no: EM132517828

Part 1

Part of your network design for the U.S. Navy project will include a design of a plan that focuses on authentication issues. The overall design will be for a network that includes Windows server active directory and Unix servers. Discuss authentication methods that could be used in this environment. Do you think that biometrics could be useful for this situation?

Part 2

One of the concerns for the network project is ensuring secure e-mail and any documents sent through e-mail. Prepare a paper that explains how e-mail messages can be securely sent. The paper should include the features of secure e-mail and how secure e-mail works. Include a discussion of vulnerabilities involved in e-mail and how they can be countered. The paper should include the following:

The 4 main features of secure e-mail

Discussion of the 5-step process for handling secure e-mail with PGP and S/MIME

Discussion of the vulnerabilities of e-mail

Discussion of countermeasures that address the vulnerabilities

Reference no: EM132517828

Questions Cloud

Risk and security are always subject to perception : Risk and security are always subject to perception, point of view and biases. How do you balance a secure system over a cumbersome user experience?
Experience with information technology : Tell us about your interest in and experience with information technology. Why do you think the MSIS program is the right place for you?
Legal ethics-describe your academic interests : Describe your academic interests. Relate any incident that has impacted you that relates to a cybersecurity issue.
Assignment paper on iaas cloud services : Create a paper that compares and contrasts how IaaS facilitates system redundancy and load balancing.
Design of plan that focuses on authentication issues : Part of your network design for the U.S. Navy project will include a design of a plan that focuses on authentication issues.
Social networking data for smart cities : how Big Data analytics can be used with Smart Cities. This is exciting and can provide many benefits to individuals
Crime prevention through environmental design : What is Crime Prevention Through Environmental Design (CPTED)? List and discussed the four categories relating to space?
Change management methodology proposal : Prepare a change management methodology proposal that details the steps that must be taken when a change is recommended for any system.
Human factors are considered the weakest link to security : Human factors are considered the weakest link to security, which makes it crucial to change user behavior.

Reviews

Write a Review

Basic Computer Science Questions & Answers

  What window events can a program handle

What is the paintComponent method? How is it used in Java graphics? How does a program intentionally cause the paintComponent method to execute?

  What are the advantages of flash memory

What are the advantages of flash memory over hard disk storage? What are the advantages of hard disk over flash memory storage

  Run the program specifying a small allocation block size

Run the program specifying a small allocation block size.

  Python statements for three math expressions

Then write three Python statements for the following three math expressions. Finally, calculate and print out the values of variables a, b, and c.

  Write down the firm total cost function

a. Write down the firm's total cost (TC) function. b. What is the firm's profit-maximizing output if the market price is 100?

  Compare vision of multimedia pioneers among alen turing

Compare the vision of the multimedia pioneers among Alen Turing, Vannevar Bush, and Douglas Engelbart in their approaches to meet human needs?

  What are the major problems

What are the major problems (or side-effects) while using Agile Development Methodology (for example Scrum and XP)?

  Define the stack operations push pop and peek

Imagine a linked implementation of the ADT stack that places the top entry of the stack at the end of a chain of linked nodes. Describe how you can define the stack operations push, pop, and peek so that they do not traverse the chain.

  Technology to substantially improve their business

Can you find an example of a company that has used technology to substantially improve their business? Describe the technology and its impact on the specific.

  Important ethical and societal issues

In your own opinion, what are some important ethical and societal issues that need to be addressed in the field of Information Technology?

  Inefficient and unfair imposition of costs

If government imposes on the firms in a polluting industry penalities (taxes) that exceed the actual value of the damages done by the population

  What is the name of the text file on a windows

What is the name of the text file on a Windows computer that may store DNS to IP address mappings?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd