Encryption uses cryptographic algorithms to obfuscate data. These complex algori

Encryption uses cryptographic algorithms to obfuscate data. These complex algorithms transform data from human-readable plaintext into encrypted cipher text. Encryption uses the principles of substitution and permutation to ensure that data is transformed in a nondeterministic manner by allowing the user to select the password or a key to encrypt a message. The recipient must know the key in order to decrypt the message, translating it back into the human-readable plaintext.
There are six steps that will lead you through this project. After beginning with the workplace scenario, continue to Step 1: IT Systems Architecture.
The deliverables for this project are as follows:
Create a single report in Word document format. This report should be about 10 pages long, double-spaced, with citations in APA format. Page count does not include diagrams or tables. The report must cover the following:
network security and threat table
Common Access Card deployment strategy
email security strategy
In a Word document, share your lab experience and provide screenshots to demonstrate that you performed the lab.
You are an enterprise security architect for a company in a semiconductor manufacturing industry where maintaining competitive advantage and protecting intellectual property is vital. You’re in charge of security operations and strategic security planning. Your responsibilities include devising the security protocols for identification, access, and authorization management.
You recently implemented cryptography algorithms to protect the information organization. Leadership is pleased with your efforts and would like you to take protection methods even further. They’ve asked you to study cyberattacks against different cryptography mechanisms and deploy access control programs to prevent those types of attacks.
“We’d like you to create plans for future security technology deployments,” says one senior manager, “and provide documentation so that others can carry out the deployments.” A director chimes in: “But you should also devise a method for ensuring the identification, integrity, and nonrepudiation of information in transit at rest and in use within the organization.”
As the enterprise security architect, you are responsible for providing the following deliverables:
Create a network security vulnerability and threat table in which you outline the security architecture of the organization, the cryptographic means of protecting the assets of the organizations, the types of known attacks against those protections, and means to ward off the attacks. This document will help you manage the current configuration of the security architecture.
Create a Common Access Card, CAC deployment strategy, in which you describe the CAC implementation and deployment and encryption methodology for information security professionals.
Create an email security strategy in which you provide the public key/private key hashing methodology to determine the best key management system for your organization. These documents will provide a security overview for the leadership in your company.
Encryption uses cryptographic algorithms to obfuscate data. These complex algorithms transform data from human-readable plaintext into encrypted cipher text. Encryption uses the principles of substitution and permutation to ensure that data is transformed in a nondeterministic manner by allowing the user to select the password or a key to encrypt a message. The recipient must know the key in order to decrypt the message, translating it back into the human-readable plaintext.
There are six steps that will lead you through this project. After beginning with the workplace scenario, continue to Step 1: IT Systems Architecture.
The deliverables for this project are as follows:
Create a single report in Word document format. This report should be about 10 pages long, double-spaced, with citations in APA format. Page count does not include diagrams or tables. The report must cover the following:
network security and threat table
Common Access Card deployment strategy
email security strategy
In a Word document, share your lab experience and provide screenshots to demonstrate that you performed the lab.
Competencies
Your work will be evaluated using the competencies listed below.
1.5: Use sentence structure appropriate to the task, message and audience.
1.6: Follow conventions of Standard Written English.
1.7: Create neat and professional looking documents appropriate for the project or presentation.
2.1: Identify and clearly explain the issue, question, or problem under critical consideration.
2.2: Locate and access sufficient information to investigate the issue or problem.
2.3: Evaluate the information in a logical and organized manner to determine its value and relevance to the problem.
2.4: Consider and analyze information in context to the issue or problem.
3.2: Employ mathematical or statistical operations and data analysis techniques to arrive at a correct or optimal solution.
10.7: Knowledge of procedures, tools, and applications used to keep data or information secure, including public key infrastructure, point-to-point encryption, and smart cards.
IT Systems Architecture
You are a senior-level employee, and you must tailor your deliverables to suit your audience: the leadership of the organization. You may choose to use a fictitious organization, or model your organization on an existing organization. Remember that your deliverables should include proper citations.
Leadership is not familiar with the architecture of the IT systems, nor are they familiar with the types of threats that are likely or the security mechanisms in place to ward off those threats. You will provide this information in tabular format and call it the Network Security and Vulnerability Threat Table. Refer to this threat table template for guidance on creating this document.
Before you begin, select the links below to review some material on information security. These resources will help you complete the network security and vulnerability threat table.
LAN security
availability
Now you’re ready to create your table. Include and define the following components of security in the architecture of your organization, and explain if threats to these components are likely, or unlikely:
LAN security
identity management
physical security
personal security
availability
privacy
Next, review the different types of cyberattacks described in the following resource: cyberattacks. As you’re reading take note of which attacks are most likely to affect your organization. Then list the security defenses you employ in your organization to mitigate these types of attacks. Include this information in your Network Security and Vulnerability Threat Table.
Plan of Protection
In this lab exercise, you will learn more about the transmission of files that do not seem suspicious but that actually have embedded malicious payload, undetectable to human hearing or vision. This type of threat can enter your organization’s networks and databases undetected through the use of steganography or data hiding.
You should include this type of threat vector to an organization in your report to leadership. Research how organizations can monitor, identify, and remedy those files with embedded files and data, and provide these as recommendations for your leadership.
You will have to provide the leadership of your organization with your plan for protecting identity, access, authorization and nonrepudiation of information transmission, storage, and usage.
Research scholarly works on nonrepudiation measures and discuss options for protecting the integrity of an organization’s information assets, which include files, networks, databases, and email, and include this in your lab report.
Complete This Lab
Resources
Accessing the Virtual Lab Environment: Navigating UMGC Virtual Labs and Lab Setup
Self-Help Guide (Workspace): Getting Started and Troubleshooting
Link to the Virtual Lab Environment: https://vdi.umgc.edu/
Lab Instructions
Understanding Cryptography and Data Protection
Getting Help
To obtain lab assistance, fill out the support request form.
Make sure you fill out the fields on the form as shown below:
Case Type: UMGC Virtual Labs Support
Customer Type: Student (Note: faculty should choose Staff/Faculty)
SubType: ELM-Cyber (CST/DFC/CBR/CYB)
SubType Detail: Pick the category that best fits the issue you are experiencing
Email: The email that you currently use for classroom communications
In the form’s descriiption box, provide information about the issue. Include details such as steps taken, system responses, and add screenshots or supporting documents.
Take Note
Intellectual property (IP) rights are an extension of principles underlying academic integrity. IP is enforceable through copyright, patent, and trademark laws. The laws that exist to protect IP encourage both individual and enterprise-level innovation. For similar underlying ethical principles, it is just as important to give credit to original ideas through references and citations in academic work. We want to reward prior efforts so that in turn our own efforts will be protected.
Data Hiding Technologies
You will describe to your organization the various cryptographic means of protecting its assets. Select the links below to review encryption techniques and encryption technologies, then provide your organization with a brief overview of each.
Encryption technologies
shift/Caesar cipher
polyalphabetic cipher
one-time pad cipher/Vernam cipher/perfect cipher
block ciphers
triple DES
RSA
Advanced Encryption Standard (AES)
symmetric encryption
texture block coding
Data Hiding Technologies
information hiding and steganography
digital watermarking
masking and filtering
These descriiptions will be included in the network security vulnerability and threat table for leadership.
Create the Network Security Vulnerability and Threat Table
Using the information you’ve gathered from the previous steps, prepare the network security vulnerability and threat table, in which you outline the following:
security architecture of the organization
the cryptographic means of protecting the assets of the organization
the types of known attacks against those types of protections
means to ward off the attacks
Create your Network Security Vulnerability and Threat Table and include it in your submission to the organization. Refer to this threat table template for guidance on creating this document.
Access Control Based on Smart Card Strategies
Smart cards use encryption chips to identify the user’s identity, role, and sometimes use the user’s personal identifiable information (PII).
Two examples of smart cards are the federal government’s use of Common Access Cards (CACs), and the financial sector’s use of encryption chips in credit cards.
You have completed your threat table, and you’ve decided that you want to modernize the access control methods for your organization. To that end, read the following resources to gather some background information on access control and the various encryption schemas associated with a CAC:
access control
Common Access Card (CAC)
You plan to deploy CAC to the company and you are tasked with devising that CAC deployment strategy, which includes the cryptographic solutions used with the CAC.
In the Common Access Card Deployment Strategy final deliverable, describe how identity management would be a part of your overall security program and your CAC deployment plan:
Create your Common Access Card Deployment Strategy and include it in your submission to the organization.
The Email Security Strategy
After completing the CAC, your next step is to build the Secure Email Strategy for the organization. You will present this tool to your leadership.
Provide an overview of the types of public-private key pairing, and show how this provides authentication and nonrepudiation. You will also add hashing and describe how this added security benefit ensures the integrity of messaging.
Begin preparing your strategy by reviewing the following resources that will aid you in becoming well informed on encryption technologies for email:
public key infrastructure (PKI)
iOS encryption
Then start developing your strategy. Define these strong encryption technologies as general principles in secure email:
Pretty Good Policy (PGP algorithm)
GNU Privacy Guard (GPG)
public key infrastructure (PKI)
digital signature
mobile device encryption (e.g., iOS encryption and Android encryption)
In your report, also consider how the use of smart card readers tied to computer systems might be beneficial in the future enhancements to system and data access protection. This may help you define long-term solutions for your leadership.
Leadership does not know the costs and technical complexity of these email encryption strategies. To further their understanding, compare the complexities of each in relation to the security benefits, and then make a recommendation and a deployment plan.
The deliverables for this project are as follows:
Create a single report in Word document format. This report should be about 10 pages long, double-spaced, with citations in APA format. Page count does not include diagrams or tables. The report must cover the following:
network security and threat table
Common Access Card deployment strategy
email security strategy
In a Word document, share your lab experience and provide screenshots to demonstrate that you performed the lab.
Submit your deliverables to the Assignments folder after reading the instructions below.
Check Your Evaluation Criteria
Before you submit your assignment, review the competencies below, which your instructor will use to evaluate your work. A good practice would be to use each competency as a self-check to confirm you have incorporated all of them. To view the complete grading rubric, click My Tools, select Assignments from the drop-down menu, and then click the project title.
1.5: Use sentence structure appropriate to the task, message and audience.
1.6: Follow conventions of Standard Written English.
1.7: Create neat and professional looking documents appropriate for the project or presentation.
2.1: Identify and clearly explain the issue, question, or problem under critical consideration.
2.2: Locate and access sufficient information to investigate the issue or problem.
2.3: Evaluate the information in a logical and organized manner to determine its value and relevance to the problem.
2.4: Consider and analyze information in context to the issue or problem.
3.2: Employ mathematical or statistical operations and data analysis techniques to arrive at a correct or optimal solution.
10.7: Knowledge of procedures, tools, and applications used to keep data or information secure, including public key infrastructure, point-to-point encryption, and smart cards.

How to create Testimonial Carousel using Bootstrap5

Clients' Reviews about Our Services