Which encryption solution best meets the company’s needs?

Swamped with your writing assignments? Take the weight off your shoulder!

Submit your assignment instructions

Provide your reflection on the following two questions based on your experience in the modules of the course.
Your reflection should address the following questions and contains minimum 300 words in length. Make sure you use correct spellings and grammar.
1. Which aspects of these modules did you like? and Why? You can reflect on any topics related to course contents, delivery method, or activity. (10 points)
2. List three aspects of information security related concepts/ideas that you found important in the course so far. What make these concepts/ideas important to you? (15 points)
Write the paper based on this topics that were covered during the course.
Topics that were covered:
Module 4: Applying Authentication and Access Control”.
The following are types of security controls:
Administrative controls: Policies approved by management and passed down to staff, such as policies on password length
Logical/technical controls: Control access to a computer system or network, such as a username and password combination
Hardware controls: Equipment that checks and validates IDs, such as a smart card for or security token for multifactor authentication
Software controls: Controls embedded in operating system and application software, such as NTFS permissions
Physical controls: Control entry into buildings, parking lots, and protected areas, such as a lock on an office door
Example of questions answered during discussion
What are two types of data and connections that Shovels and Shingles should protect?
Which types of security controls would protect that data?
Module 5: “Using Encryption to Enhance Confidentiality and Integrity”.
The following are common encryption algorithms and methods:
Data Encryption Standard (DES)
Rivest, Shamir, and Adleman (RSA) encryption algorithm
Triple DES (3DES)
Diffie-Hellman key exchange
Blowfish
Secure Sockets Layer (SSL)
Transport Layer Security (TLS)
Advanced Encryption Standard (AES)
Digital signatures
Example of question discussed.
Which encryption solution best meets the company’s needs? Explain your answer.
Module 6: “Assessing Common Attack Vectors”.
Learning Objectives and Outcomes
Analyzing supply chain attacks and protection.
Assignment Requirements
In 2020, a hack against SolarWinds was revealed, which quickly proved to affect a much larger number of companies that were part of the SolarWinds supply chain, including the U.S. government.
The hackers used a supply chain attack to insert malicious code into SolarWinds Orion, an IT performance monitoring platform. The supply chain attack targeted third parties with access to SolarWinds systems. The original attack began long before it was detected because of the way in which the backdoor malware was able to hide itself, even from antivirus software. The malware was distributed inadvertently by SolarWinds as an update or patch to Orion.
Example of question discussed.
Do you think supply chain companies are now protected from these types of attacks? Why or why not?
Module 7: “Implementing an IT Security Policy”.
Learning Objectives and Outcomes
Compare change management and configuration management.
Assignment Requirements
Example of question discussed:
How are change management and configuration management related?
If you have a strict configuration management process, do you need change management? Why or why not?

Swamped with your writing assignments? Take the weight off your shoulder!

Submit your assignment instructions

Place this order or similar order and get exceptional paper written by our team of experts at an affordable price

Leave a Reply