A Secure Email Strategy For Cyber Tech International
You are an enterprise security architect for a company in a semiconductor manufacturing
the industry, where maintaining competitive advantage and protecting intellectual property, is vital.
You're in charge of security operations and strategic security planning. Your responsibilities
include devising the security protocols for identification, access, and authorization management.
You recently implemented cryptography algorithms to protect the information organization.
Leadership is pleased with your efforts and would like you to take protection methods even
further. They've asked you to study cyberattacks against different cryptography mechanisms
and deploy access control programs to prevent those types of attacks.
We'd like you to create plans for future security technology deployments, says one senior
manager. And provide documentation so that others can carry out the deployments. A director
chimes in, but you should also devise a method for ensuring the identification, integrity, and
nonrepudiation of information in transit at rest and in use within the organization.
As the enterprise security architect, you are responsible for providing the following deliverables.
Create a network security vulnerability and threat table in which you outline the security
the architecture of the organization, the cryptographic means of protecting the assets of the
organizations, the types of known attacks against those protections, and means to ward off the
attacks. This document will help you manage the current configuration of the security
architecture.
Create a Common Access Card, CAC deployment strategy, in which you describe the CAC
implementation and deployment and encryption methodology for information security
professionals. Create an email security strategy in which you provide the public key, private key
hashing methodology to determine the best key management system for your organization.
These documents will provide a security overview of the leadership in your company.
IT SYSTEMS ARCHITECTURE
You are a senior-level employee and you must tailor your deliverables to suit your audience: the leadership of the organization. You may choose to use a fictitious organization, or model your organization on an existing organization, including proper citations.
Leadership is not familiar with the architecture of the IT systems, nor are they familiar with the types of threats that are likely or the security mechanisms in place to ward off those threats. You will provide this information in tabular format and call it the Network Security and Vulnerability Threat Table. Refer to this threat table template for guidance on creating this document.
Before you begin, select the links below to review some material on information security. These resources will help you complete the network security and vulnerability threat table.
Network Security and Vulnerability Threats Template
You will identify the IT system assets of the system architecture of your organization. These can be fictitious or modeled after existing architectures. Be sure to cite using APA format. You will identify threats and vulnerabilities to IT system assets and the security mechanisms used to address them.
Below is the table, Note 3 rows, and 13 columns
(IT System Assets /Threats and Vulnerabilities/ Security Mechanisms to Address Threats and Vulnerabilities.) in
LAN security
Availability
Now you’re ready to create your table. Include and define the following components of security in the architecture of your organization, and explain if threats to these components are likely, or unlikely:
LAN security
identity management
physical security
personal security
availability
privacy
Next, review the different types of cyber attacks described in the following resource: cyberattacks. As you’re reading take note of which attacks are most likely to affect the organization. Then list the security defenses you employ in the organization to mitigate these types of attacks. Include this information in your Network Security and Vulnerability Threat Table.
DATA HIDING TECHNOLOGIES.
You will describe to the organization the various cryptographic means of protecting its assets. Select the links below to review encryption techniques and encryption technologies, then provide your organization with a brief overview of each.
Encryption Technologies
- Shift / Caesar cipher;
- Polyalphabetic cipher;
- One time pad cipher/Vernam cipher/perfect cipher;
- Block ciphers;
- triple-DES;
- RSA;
- Advanced Encryption Standard (AES);
- Symmetric encryption;
- Text block coding;
- Data Hiding Technologies.
DATA HIDING TECHNOLOGIES
- Information hiding and steganography;
- Digital watermarking;
- Masks and filtering
These descriptions will be included in the network security vulnerability and threat table for leadership.
CREATING THE NETWORK SECURITY VULNERABILITY AND THREAT
Prepare the network security vulnerability and threat table, in which you outline the following:
- the security architecture of the organization
- the cryptographic means of protecting the assets of the organization
- the types of known attacks against those types of protections
means to ward off the attacks
Create your Network Security Vulnerability and Threat Table, and include it in your submission to the organization.
ACCESS CONTROL BASED ON SMART CARD STRATEGIES
Smart cards use encryption chips to identify the user, their identity, role, and sometimes use their personal identifiable information (PII). Two examples of smart cards are the federal government’s use of common access cards (CAC), and the financial sector’s use of encryption chips in credit cards.
THE EMAIL SECURITY STRATEGY
Provide an overview of the types of public-private key pairing, and show how this provides authentication and nonrepudiation. You will also add hashing, and describe how this added security benefit ensures the integrity of messaging.
Begin preparing your strategy by reviewing the following resources that will aid you in becoming well informed on encryption technologies for e-mail:
- Public Key Infrastructure (PKI)
- iOS encryption
- Blackberry encryption
Then start developing your strategy. Define these strong encryption technologies as general principles in a secure email:
Pretty Good Policy (PGP algorithm)
- GNU Privacy Guard (GPG)
- Public Key Infrastructure (PKI)
- Digital signature
Mobile device encryption (e.g., iOS encryption and Blackberry encryption)
In your report, also consider how the use of smart card readers tied to computer systems might be beneficial in the future enhancements to system and data access protection. This may help you define long-term solutions for your leadership.
Leadership does not know the costs and technical complexity of these email encryption strategies. To further their understanding, compare the complexities of each in relation to the security benefits, and then make a recommendation and a deployment plan.
Note:
Time of deliverable and in-text citation is very important in this paper. This will give me enough to review the paper before submission. I have a week to turn the paper in. Thank you.
Network Security and Vulnerability
A Secure Email Strategy for Cyber Tech International
Name
Course
Date
Network security vulnerability and threat table
IT System Assets
Threats and Vulnerabilities
Security Mechanisms to Address Threats and Vulnerabilities
LAN Security
Eavesdropping
Spoofing
Denial of service
Monitor the network
Use authentication/encryption protocols
WLAN Architecture
Passive Capturing
Use cryptography to secure the transmission of data and information.
Pattern recognition and analytics to detect and thwart attacks
Firewalls
Guest ID allowed on server
there are backdoors to firewall
Secure the firewall and improve the authentication process to filter out malicious users.
Improve intrusion detection
Physical Security
Impersonation
Social engineering to gain users credentials
Inadequate security
Only authorized people are allowed to access servers and important information assets/
Verify the users using a multistep approach
Routers and Switches
Those with IP addresses may access the LAN
Eavesdropping
Integrate better access controls on the router and limit access.
Update the routers or patch up
Endpoint security controls for server
Not all traffic goes through the secured endpoints
Secure endpoint devices
Use anti-malware updated software
Monitoring endpoint activities remotely
Use Virtual Private Network (VPN) access control and personal firewalls.
Entity anomaly detection
Software
Unauthorized access because data and information
Security flawsEncrypt the data
Software patches
Updating software
Wireless Security
Rogue access points
Unauthorized access
Passive capturing
Wireless intrusion prevention system that minors access points
Mobile devices operating system
OS vulnerability
Weak cryptography
OS based malware
client side injection
Security updates
Patches
Remote Access (VPNs)
Leak of identity and
privacy
Use encrypting tools
Improve authentication
Desktop, Laptop and electronic devices
Phishing
Spyware
Robust password management
Ensures that the routers and devices have good firewalls
Anti-virus
Keep devices up to date
Network
Phishing Attacks
Malware
Denial of Service
Unauthorized intrusion
Network monitoring
Firewalls
Encrypt data
Algorithms to detect network behavior
Incident and Response Reporting
Weak threat and vulnerability detection policies
Poor coordination and cooperation during previous security breach
Incident handling to emphasize more on communication, coordination and cooperation.
IT Policies and Procedures
Inadequate policies to deal with resource and network allocation issues
Detection, monitoring and reporting network activities.
Protecting the Information Organization
* LAN security is protecting the Local Area Network (LAN) and the devices that are connected to the LAN within a small area including the wireless networks threats include phishing, spyware, DOS and DDOS attacks, computer viruses and malwares.
* Identity management is the protection of the identification, authentication and authorization of who has access to the information system, network and applications including restrictions and privileges.
* Physical security reflects the security measures to protect the hardware, software, network and data from data loss and other events that could cause damage including natural events. Isolating the hardware elements and protecting access improves security and there is greater access control to prevent unauthorized personnel.
* Personal security is the security measures to ensure that only the authorized people can access hardware and the network.
* Availability is the state of being accessible when required and by the authorized persons
* Privacy is he aspect of protecting the personal data so that it is not shared to third parties and authorized persons and there is emphasis on security and confidentiality.
Cyber attacks
Malware
This is a malicious code or software that damages the network and computer system in different ways including accessing passwords and obtaining unauthorized information, using updated software is necessary to offer protection.
Denial of distributed service (DDoS)
This type of computer attack consists of generating a huge amount of traffic from numerous devices to a website or network, which disrupts services when the network becomes saturated and its normal operation is interrupted. Firewalls and other protective measures are implemented and software updates should be prioritized.
Spoofing
Identity theft for malicious purposes through manipulating then intended targets and falsifying the origin of messages to manipulate the potential victims. The computer users’ behavior and backing up the sensitive data are required (Gupta, Singhal & Kapoor, 2016).
Phishing
Phishing is similar to spoofing, but the users are deceived where their identity and information is revealed to the attackers who use their identity or trick them to click on certain webpages. Training users of the computer system and network on good digital security measures is important to improve computer security (Gupta, Singhal & Kapoor, 2016). There should also be improvement in verification of requests.
Access Control Based On Smart Card Strategies
Smart cards are increasingly used because of the level security and the storage capacity including the personal identifiable information (PII) and Common Access Card (CAC). The Common Access Card (CAC) is necessary to authenticate the users and is a smartcard with a chip containing the information unique to each individual and it is used to store sensitive information (Theofanos, Garfinkel & Choong, 2016). There is data encryption of the data...
👀 Other Visitors are Viewing These APA Essay Samples:
-
Provide An Introduction To Digital Forensic Analysis
4 pages/≈1100 words | 3 Sources | APA | IT & Computer Science | Research Paper |
-
Enterprise Key Management Plan
6 pages/≈1650 words | 7 Sources | APA | IT & Computer Science | Research Paper |
-
Enterprise Key And Management Policy In Senthara Health Care
2 pages/≈550 words | 3 Sources | APA | IT & Computer Science | Research Paper |