Now that you have a sense of the structure and format of your ePortfolio, you will be accelerating your pace by creating two new sections in your

Now that you have a sense of the structure and format of your ePortfolio, you will be accelerating your pace by creating two new sections in your ePortfolio for this module’s assignment. Follow the instructions below to complete Part I and Part II of the assignment.

Part I: Cryptography

  1. Create a section titled, “Cryptography.”
  2. On the main page of the section, include a short summary of the subject.
  3. Then, you may elect to either:
    • Choose subsections incorporating coursework (e.g. discussions, assignments, journals, etc.) that pertain to the following topics from  Introduction to Cryptography (Block Ciphers); Hash Functions, Message Authentication Codes and Secure Channels; Key Distribution Protocols [Diffie-Hellman, Rivest, Shamir, Adelman (RSA)]; Key Management (Kerberos); and Public Key Infrastructure, or
    • Incorporate your  Applied Cryptography Final Project as an overarching example.
  4. Expand upon and rework the incorporated subsections or final project coursework so that they substantiate your understanding of the associated professional and ethical responsibilities for their application.
  5. Create a “Reflection” subsection within the “Cryptography” section, and compose a one- to two-page explanation of why you chose those artifacts. Provide a justification for including them in your portfolio, and discuss new insights or key understandings that may have prompted your selection. Explain how you are or foresee yourself incorporating knowledge in your professional life. Discuss how these artifacts reflect your knowledge of professionalism and ethics as they relate to cryptography.
  6. Incorporate three (3) to seven (7) researched and evaluated reference links and materials that apply to your section and subsection topics, filing them under an appropriate subsection in the “Reference Link Library” section or the “Cryptography” section of your ePortfolio.

Part II: Enterprise Security Architecture

The goal for the Architecture section will be to introduce the concept, explain its utility, and then provide valuable examples from completed coursework that may be leveraged in the future as templates.

  1. Create a section titled, “Security Architecture.”
  2. Write a short paragraph describing why Security Architecture artifacts are valuable tools for maintaining consistency and traceability in security design. For a follow-up paragraph, consider using your Assignment: Describing the Seven Layers of the SABSA Architecture from Module 1 to explain the relationship between the five main SABSA Layers. Also, consider incorporating the diagram of the SABSA 7-Layer Model and the 36-Cell Matrix from the Sherwood Text in your ePortfolio.
  3. Create a minimum of five (5) subsections incorporating coursework that pertains to the topics addressed from (Conceptual Security Architecture, Logical Security Architecture, Physical Security Architecture, Component Security Architecture and Operations). At your discretion, use as much of your own coursework as templates for the subsections accounting for each layer covered in the course.
  4. Expand upon and rework the subsections so that they substantiate your understanding of the associated professional and ethical responsibilities for their application.
  5. Create a “Reflection” subsection within the “Security Architecture” section, and compose a one- to two-page explanation of why you chose those artifacts. Provide a justification for including them in your portfolio, and discuss new insights or key understandings that may have prompted your selection. Explain how you are or foresee yourself incorporating this knowledge in your professional life. Discuss how these artifacts reflect your knowledge of professionalism and ethics as they relate to security architecture.
  6. Incorporate three (3) to seven (7) researched and evaluated reference links and materials that apply to your section and subsection topics, filing the resources under an appropriate subsection in the “Reference Link Library” section or the “Security Architecture” section of your ePortfolio.

Share This Post

Email
WhatsApp
Facebook
Twitter
LinkedIn
Pinterest
Reddit

Order a Similar Paper and get 15% Discount on your First Order

Related Questions

Description Deliverable Length: 3 pages Develop a facts and assumptions information paper about a core issue dealing with 1 of the following:

Description Deliverable Length: 3 pages Develop a facts and assumptions information paper about a core issue dealing with 1 of the following: TechnologyVulnerability assessment and protectionIntellige Description Deliverable Length: 3 pages Develop a facts and assumptions information paper about a core issue dealing with 1 of the following: Technology Vulnerability assessment

Write 400-600 words that respond to the following questions with your thoughts, ideas, and comments. Be substantive and clear, and use examples to

Write 400-600 words that respond to the following questions with your thoughts, ideas, and comments. Be substantive and clear, and use examples to reinforce your ideas. Read the Young and McConkey (2012) article and Otto (2011) articles about data governance and data quality. Read the Abraham et al (2019) articles to understand their governance framework (specifically

Update the Enterprise Content Management and Data Governance Policies and Procedures Manual title page with a new date and project name. Update the

Update the Enterprise Content Management and Data Governance Policies and Procedures Manual title page with a new date and project name. Update the previously completed sections based on instructor feedback. Suggested Headings for Data Governance Evaluation Basis Breakdown outcomes of governance (good and bad) and how their organizations should consider

 Assessment 3 Detail Python Programming Assessment: Restaurant Menu Management System This assessment evaluates your ability to utilise Python’s data

 Assessment 3 Detail Python Programming Assessment: Restaurant Menu Management System This assessment evaluates your ability to utilise Python’s data structures and functions to create a menu management system for a restaurant. Project Objective: Develop a Python program that simulates a restaurant menu using functions and data structures. This program will

Assessment 3 Detail Python Programming Assessment: Restaurant Menu Management System This assessment evaluates your ability to utilise Python’s data

Assessment 3 Detail Python Programming Assessment: Restaurant Menu Management System This assessment evaluates your ability to utilise Python’s data structures and functions to create a menu management system for a restaurant. Project Objective: Develop a Python program that simulates a restaurant menu using functions and data structures. This program will

Write 400-600 words that respond to the following questions with your thoughts, ideas, and comments. Be substantive and clear, and use examples to

Write 400-600 words that respond to the following questions with your thoughts, ideas, and comments. Be substantive and clear, and use examples to reinforce your ideas. Read the Helms and Nixon (2010) article (specifically about analysis) and Han (2004) article (specifically section 2) and Pereira et al. (2012) article.  Discuss and contrast a method of