Skip to main content

Identify at least four encryption methods/technologies that will directly address the concerns raised by Lee about the Southern Star network.

 Encryption Project 1

Project overview
After examining the Southern Star scenario, you will start by identifying what can be done to address the current security weaknesses.
You will then be surveying the market for encryption technologies that will help to meet these security needs and finally developing an Encryption Plan for Southern Star.
Stage 1: Identifying encryption solutions to the current security issues
1.1 After reviewing the scenario, you need to identify improvements that need to be made to meet the enterprise data security needs.
? Identify at least four encryption methods/technologies that will directly address the concerns raised by Lee about the Southern Star network.
? Put these in a document titled “Southern Star – Security Upgrade Research”.
? Use the provided Southern Star Report Template.
1.2 Review the range of available whole disk encryption products (at least 5) and rank them against the appropriate requirements identified in section 1.1 above.
? Use a table similar to the one below to record and rank these products.
? Include these in your Southern Star – Security Upgrade Research document.
Vendor Product name and description Rank
AES Advanced Encryption Standard AES is the algorithm highly efficient in 128bit form also can use 192 and 256 bit encryption.
Twofish Twofish, keys used in this algorithm may be up to 256 bits and as a symmetric only need one key. ideal for use in Hardware and software.
RSA Security RSA, this is an asymmetric algorithm due to use 2 keys, public and private key. This will make it hard for attackers.
Blowfish Blowfish replace DES. This symmetric is 64 bits and encrypts them in individually. used for e-commerce and secure payment s.
1.3 Review the range of available SSL certificates (at least 5) from one or several vendors. Investigate their cost, validity period, and bit length options.
? Use a table similar to the one below to record and rank these products.
? Include these in your Southern Star – Security Upgrade Research document.
Vendor & Plan Name Validity Period Bit Length Options Plan Cost Rank
GeoTrust Expert support one year 256-bit $344
DigiCert Wildcoard SSL one year 4096-bit $700
Network Solutions Xpress plan one year 256-bit $59.99
SSL.com High Assurance two years 2048+ bit $110
Sectigo Sectigo SSL DV one year 256-bit $79
Stage 2: Developing an Encryption Plan
2.1 Create a draft encryption plan to provide appropriate encryption technologies for the organisation.
? Create your plan using the headings provided on the next page ??Put these into a document titled “Southern Star – Encryption Plan”.
? Use the provided Southern Star Report Template.
2.2 Email your draft Encryption Plan to a.neupane@cqu.edu.au for feedback. Use appropriate email netiquette as if you were sending the document to David (General Manager).
2.3 Review feedback received, revise as necessary and then submit your Final Encryption Plan in CQU Moodle.
Continued on next page …
1.0 Background
2.0 Purpose and Scope
3.0 Policy
• Cryptographic control (Overall use of cryptography)
• Key management (How encryption keys will be managed across their life cycle)
• Network encryption (Protocols used for communications across networks)
• Hard disk encryption (Protection against loss/theft of devices such as laptops)
4.0 Project team roles and responsibilities (based on scenario staff)
• Responsible parties
• Ownership
• Communication
• Policy review and maintenance
5.0 Internal Compliance
6.0 Applicability to staff
End of Assessment
=========

Adapted by permission of the copyright holder © 2020 CAQA
Encryption Project 2
Project Scenario : Southern Star
Business this assessment is based on:
Documentation reviewed as preparation: Southern Star - Business and Situation Overview.pdf
Assessment Submission: Submit all documents in CQU Moodle
Documents to be submitted: See the list below …
? Southern Star - Encryption Implementation Strategy
? Southern Star - Encryption Technologies Impact Analysis Report
? Southern Star - Encryption Technologies Performance Report
? Southern Star end user – Encryption feedback form
? Southern Star Helpdesk – Encryption feedback form
ICTNWK537 Implement secure encryption technologies | Encryption Project 2 | Ver 21.1 | Page 2
Encryption Project 2
Stage 1: Installing encryption software
Before starting this practical Encryption Project, you will need to have Windows Server 2016 and a Windows 10 client installed in virtual machines. You can use a hypervisor product such as Windows Hyper-V or Oracle VirtualBox.
You have received approval from David (General Manager) to implement a pilot of the encryption project. You are required to install encryption software and tools in a pilot environment prior to going live. You will be documenting the process to provide documentation for the “Go Live” stage.
? Assume yourself as “Lee” (Head of Security) and install, test and use the following encryption software and tools.
? You need to install encryption software on the Windows Server and Windows 10 client VMs as indicated.
? You will also need to have access to your own personal computer (not in a VM) with Microsoft Outlook installed. ? Document the following 3 tasks in a document titled:
“Southern Star - Encryption Implementation Strategy”. Use the provided Southern Star Report Template.
1.1 Create and Install a self-signed SSL certificate in IIS on your Windows Server (Note: must include step-by-step instructions and screenshots)
1.2 Configure and enable BitLocker on the Windows Server and on the Windows 10 Client. (Note: must include step-by-step instructions and screenshots)
1.3 Configure Microsoft Outlook to use secure protocols for accessing your CQU student email account ?????.?????@cqumail.com.
(Note: must include step-by-step instructions and screenshots)
Stage 2: Analysing the effect of encryption on user roles
2.1 As a part of your responsibilities you need to analyse the expected effects/impacts of the encryption you have just implemented on user roles and responsibilities. Do some research and consider the impacts on the following Users/Roles and areas of responsibility: ? End Users – Email, Intranet access, and access to local drives with Bitlocker encryption.
? Helpdesk – End user support for Bitlocker and for email.
? Administrators – Certificate maintenance, ability to monitor/filter encrypted traffic at the network perimeter.
2.2 Document these effects/impacts in a document titled
“Southern Star - Encryption Technologies Impact Analysis Report”. Use the provided Southern Star Report Template.
Write each of the three sections in language appropriate to the target audience i.e., End Users, Helpdesk & Network Administrators.
The table below summarises the minimum list of impacts to be addressed:
Encryption Technologies Impact Analysis Report
Role Description/effect
End Users ? Email
? Intranet access
? Access to local drives with Bitlocker encryption
Helpdesk ? End user support for Bitlocker
? End user support for Email usage
Administrators ? Certificate maintenance
? Ability to monitor/filter encrypted traffic at the network perimeter
Stage 3: Checking functioning and performance of Encryption software
You should have now implemented the encryption technologies in the previous stage. Now, you are required to monitor the encryption technologies functioning by performing some network monitoring.
3.1 Install an appropriate network monitoring software such as Wireshark on your virtual server to analyse the performance of the encryption technologies.
3.2 Use it to confirm that traffic is in fact being encrypted by checking for SSL/TLS traffic and encrypted data exchanges.
3.3 Check network performance to determine if there is any evidence of encryption bottlenecks impacting network performance.
3.4 Check Event Logs on the Server and Workstation for evidence of encryption related warnings and/or errors.
Compile this information into a document titled:
“Southern Star - Encryption Technologies Performance Report”. Use the provided Southern Star Report Template.
Stage 4: Gathering user feedback after implementation has been completed
Now that the encryption technologies are functioning, there is a need to find out how various stakeholders regard the impacts of these newly implemented technologies.
4.1 Develop a Feedback form that can be used to obtain feedback from end-users about the impacts (positive and negative) that they have observed.
? Remember, most end-users do not understand a lot of technical terms. ? Name the Form “Southern Star end user – Encryption feedback form” ? Use the provided Southern Star Feedback Template.
4.2 Develop a Feedback form that can be used to obtain feedback from Helpdesk personnel about the impacts (positive and negative) that they have observed.
? Ensure the terminology used is appropriate for Helpdesk personnel.
? Name the Form “Southern Star Helpdesk – Encryption feedback form”.
? Use the provided Southern Star Feedback Template

GET SOLUTION FOR THIS ASSIGNMENT, Get Impressive Scores in Your Class

CLICK HERE TO MAKE YOUR ORDER

TO BE RE-WRITTEN FROM THE SCRATCH

GET SOLUTION FOR THIS ASSIGNMENT

CLICK HERE TO MAKE YOUR ORDER

TO BE RE-WRITTEN FROM THE SCRATCH

NO PLAGIARISM

  • Original and non-plagiarized custom papers- Our writers develop their writing from scratch unless you request them to rewrite, edit or proofread your paper.
  • Timely Deliveryprimewritersbay.com believes in beating the deadlines that our customers have imposed because we understand how important it is.
  • Customer satisfaction- Customer satisfaction. We have an outstanding customer care team that is always ready and willing to listen to you, collect your instructions and make sure that your custom writing needs are satisfied
  • Confidential- It’s secure to place an order at primewritersbay.com We won’t reveal your private information to anyone else.
  • Writing services provided by experts- Looking for expert essay writers, thesis and dissertation writers, personal statement writers, or writers to provide any other kind of custom writing service?
  • Enjoy Please Note-You have come to the most reliable academic writing site that will sort all assignments that that you could be having. We write essays, research papers, term papers, Identify at least four encryption methods/technologies that will directly address the concerns raised by Lee about the Southern Star network.

Get Professionally Written Papers From The Writing Experts 

Green Order Now Button PNG Image | Transparent PNG Free Download on SeekPNG

Comments

Popular posts from this blog

Identify and discuss a key milestone in the history of computers that interests you and why.

  Part 1Title: Lab ResponseDiscuss one feature of MS Word and one feature of MS Excel that you found challenging within the lab and why. Examples are WordArt, inserting shapes, adding borders, cell styles, etc. This response should be at least one paragraph in length. Part 2Title: History of Computers Identify and discuss a key milestone in the history of computers that interests you and why. This section should be at least one paragraph. Part 3Title: System Software vs. Application Software In your words, explain the difference between application software and system software as if to another coworker who has limited technical knowledge. Use examples to support your rationalization. This section should be at least two paragraphs. Part 4Title: Blockchain and Cryptocurrency In a minimum of one paragraph each: 1. Conduct some research on the internet and discuss one underlying technology of cryptocurrencies like blockchain, cryptography, distributed ledger technol...

Cybersecurity and Infrastructure Security (CISA)

 Develop a research paper that identifies a specific Department of Homeland Security (DHS) operating agency. Fully describe 1 DHS operating agency from the following list: Cybersecurity and Infrastructure Security (CISA) U.S. Customs and Border Protection (CBP) U.S. Citizenship and Immigration Services (USCIS) Federal Emergency Management Agency (FEMA) U.S. Coast Guard (USCG) U.S. Immigration and Customs Enforcement (ICE) U.S. Secret Service (USSS) Transportation Security Administration (TSA) The information must include a discussion of the selected DHS agency. Identify the agency’s mission, goals, objectives, and metrics. Conduct an analysis of how these mission areas address the threats or challenges. Recommend agency program priorities among the current set of goals, objectives, metrics, or budget items. Justification of all choices is an essential element of this assignment. Reference all source material and citations using APA format. WE OFF...

Discuss how the project

ord count : no idea 1. You are required to write a report on all project activities involved in all the 10 knowledge areas of project management for the entire project life cycle. You should also include a list of the respective PM documents, for example PM Plan, PM Quality Management Plan, Risk management, Procurement, etc. The report must include the activities that are considered before the project is closed out. 2. Discuss how the project quality management plan can provide adequate standards and controls in managing global teams in projects. Your discussion must provide adequate arguments for the need of cultural awareness and legal issues. Regards, The post Discuss how the project appeared first on My Assignment Tutor . Assignment status :  Resolved by our Writing Team Source@ PrimeWritersBay.com GET THIS PAPER COMPLETED FOR YOU FROM THE WRITING EXPERTS   CLICK HERE TO ORDER 100% ORIGINAL PAPERS AT PrimeWritersBay.com NO PLAGIARISM