Cryptography Security Best Practices and Resources Through this two-part project you will a "Cryptography Security Best Practices and Resources" presentation. This project be an excellent addition to your portfolio and serve as a professional refe

management

Description

Cryptography Security Best Practices and Resources Through this two-part project, you will a "Cryptography Security Best Practices and Resources" presentation. This project be an excellent addition to your portfolio and serve as a professional reference for the future. The topics in your presentation will follow and upon the weekly assigned materials and activities. Please use the following steps to your project deliverables. For best results, work on your project every week. Plan to dedicate 1 to 2 hours per week to this project. DO NOT WAIT UNTIL THE LAST DAY to write your project. See the Syllabus section "Due Dates for Assignments & Exams" for due date information. 


Step 1: Establish a target audience and for your presentation. Select a real or business engaged in e-business and outline its offerings and/or services. Next, outline the categories of that may require applications. This will provide focus to your research. Optionally, you select an industry. 


Step 2: Assume you are the Director of Security for the identified in Step 1. You have been asked to provide an briefing to middle and management on the topic of cryptography and how it should be in this environment. Think about what is and/or interesting to the management team 


Step 3: Develop your executive briefing. Assume one or two PowerPoint slides per topic. Below is a proposed topic outline for your briefing. Consider using about eight topics. Your briefing should last about 15 minutes, as if it were being presented live. You should also create a Word document (6 pages), which will expand upon the concepts in more detail than the PPT. You will be submitting two items to your Dropbox: the PowerPoint and the Word document. Feasible Attacks Protection Through Cryptography The Applications of Keys Attacks on Encrypted Data and Keys Digital Encryption Standards Password-Based Encryption Good Passwords Crypto Accelerators Biometrics Using a Trusted Third Party How Public-Key Cryptography Works Comparing the Algorithms (RSA, DH, and ECDH ) Key Recovery Use of Digital Signatures Digital Signatures and Non-Repudiation Digital Signatures and Authentication See below for the grading rubric that will be used for both Parts A and B. Proper citations are required! This is a continuation from Part A. Follow the same format and style as you developed in Part A. 


Step 4: Develop your executive briefing. Assume one or two PowerPoint slides per topic. Below is a proposed topic outline for your briefing. Consider using about eight topics. Your briefing should last about 15 minutes, as if it were being presented live. You should also create a Word document (6 pages), which will expand upon the concepts in more detail than the PPT. You will be submitting two items to your Dropbox: the PowerPoint and the Word document. Public Key Infrastructures Dealing with the Legal Environment Internet Protocol Security and Architecture Integrity Check Value Calculation The Encapsulating Security Payload Protocol Security Associations and Databases Internet Key Exchange Secure Sockets Layer Cryptographic Computations S/MIME Functionality Secure Electronic Transaction (SET) Cryptographic Accelerators Smart Cards Biometrics Learning Lesson Form Break-Ins Law Enforcement Non-Repudiation Standards, Guidelines, and Regulations


Related Questions in management category


Disclaimer
The ready solutions purchased from Library are already used solutions. Please do not submit them directly as it may lead to plagiarism. Once paid, the solution file download link will be sent to your provided email. Please either use them for learning purpose or re-write them in your own language. In case if you haven't get the email, do let us know via chat support.