IT Systems Architecture and Email Security Strategy Paper
You are an enterprise security architect for a company in a semiconductor manufacturingindustry where maintaining competitive advantage and protecting intellectual property is vital. You’re in charge of security operations and strategic security planning. Your responsibilitiesinclude devising the security protocols for identification, access, and authorization management.You recently implemented cryptography algorithms to protect the information organization.Leadership is pleased with your efforts and would like you to take protection methods evenfurther.
They’ve asked you to study cyberattacks against different cryptography mechanismsand deploy access control programs to prevent those types of attacks.We’d like you to create plans for future security technology deployments, says one seniormanager. And provide documentation so that others can carry out the deployments. A directorchimes in, but you should also devise a method for ensuring the identification, integrity, andnonrepudiation of information in transit at rest and in use within the organization.
As the enterprise security architect, you are responsible for providing the following deliverables.Create a network security vulnerability and threat table in which you outline the securityarchitecture of the organization, the cryptographic means of protecting the assets of theorganizations, the types of known attacks against those protections, and means to ward off theattacks.
This document will help you manage the current configuration of the securityarchitecture.Create a Common Access Card, CAC deployment strategy, in which you describe the CACimplementation and deployment and encryption methodology for information securityprofessionals.
Create an email security strategy in which you provide the public key, private keyhashing methodology to determine the best key management system for your organization.These documents will provide a security overview for the leadership in your company
The deliverables for this project are as follows:
Create a single report in Word document format. This report should be about 10 pages long, double-spaced, with citations in APA format. Page count does not include diagrams or tables. The report must cover the following:
network security and threat table
Common Access Card deployment strategy
e-mail security strategy
See attached outline
“Place your order now for a similar assignment and have exceptional work written by our team of experts, guaranteeing you A results.”