Course Title: Introduction to Information Assurance and Information Security, homework help

Unit 4

Save your time - order a paper!

Get your paper written from scratch within the tight deadline. Our service is a reliable solution to all your troubles. Place an order on any task and we will take care of it. You won’t have to worry about the quality and deadlines

Order Paper Now

The command office has asked for a presentation on security mechanisms including access control models, authentication, authorization and encryption. Describe

differences between them and identify situations where appropriate. Discuss how encryption relates to storage, network traffic, secure Web access, and the e-mailing of

documents. One topic of concern is symmetrical versus public key.

The presentation should include the following information:

Comparison of security mechanisms

An explanation of public key cryptography

Historical background of the development of encryption

Typical uses of public key cryptography

Symmetrical versus public key

Encryption and how it relates to storage, network traffic, secure Web access and e-mail

Prepare an 8–15slide

presentation to address these points. Include speaker notes in the presentation. Plan the presentation and speaker notes so that someone else

could actually give the presentation.

Be sure to document your references using APA format.

Unit 5

You have recently accepted a position as a network administrator supporting the computer network at Camp David the US Presidential retreat in Thurmont, Maryland.

The President has requested that a WEP wireless network be installed to support the computing needs of visiting dignitaries.

Your commanding officer is having second thoughts on using the wireless network that was first considered. He is concerned about the security of a wireless endpoints.

You have recently completed your ISC2 CISSP certification and the commanding officer would like you to draw upon your knowledge of secure architecture design and

prepare a slide presentation on wireless networking and what can be done to secure a wireless network.

Include the following:

Your answers to the 6 secure architecture data collection questions of:

Why are we building this system?

Who is going to use it and why?

How is it going to be used?

What environment will it work within?

What type of security and protection is required?

What does it need to be able to communicate with?

A sample assessment of how you would gather the information necessary to design secure architecture

Consider and recommend hardware and software solutions and remote access systems.

Conclude your presentation with your strategy for conducting a penetration test and vulnerability assessment to assure external nation state hackers cannot

breach the Camp David secure network.

Include substantial research material in the speaker notes

Prepare an 8–20slide

presentation to address these points. Include speaker notes in the presentation. Plan the presentation and speaker notes so that someone else

could actually give the presentation.

 
"Looking for a Similar Assignment? Order now and Get 15% Discount! Use Code "FIRST15"
[promo3]