Evaluate symmetrical key and public key encryption methods

Assignment Help Computer Network Security
Reference no: EM131307729

Wireless and Remote Access Security

Key Assignment Draft

Great progress has been made on the design of the network with the addition of the client and server security models in the previous assignment. With the increasing popularity of remote workers and mobile devices, wireless and remote communications security is becoming an ever-increasing threat to organizations. This assignment will address wireless and remote access security for the network.

For this assignment, you will continue to work on the Network Security Architecture Design document with an evaluation of encryption methods and appropriate tools and methods to secure the wireless and remote access components and entry points in the network.

The project deliverables are as follows:

• Update the Network Security Architecture Design title page with a new date and project name.
• Update previously completed sections based on instructor feedback.
• Wireless and remote access security

o Encryption and virtual private network (VPN) access security

- Evaluate the symmetrical key and public key encryption methods, and select the most appropriate for use in the network for secure data transmission.
- Justify your selection based on an analysis of the pros and cons of each method and suitability to your network.
- Outline the methods to secure VPN access to the network and the back end databases.

o Wireless security

- Review and select the tools and methods that are necessary to securing the wireless components of the network.
- Justify your selections based on the wireless security needs of the network.

• Be sure to update your table of contents before submission.

Reference no: EM131307729

Questions Cloud

Find the energy in mev of a photon : In the 1980s, the term picowave was used to describe food irradiation in order to overcome public resistance by playing on the well-known safety of microwave radiation. Find the energy in MeV of a photon having a wavelength of a picometer.
Create an interface that allows alexander to view the flower : Create an interface that allows Alexander and Elizabeth to view the flowers in their pack. On this interface we should have an add button that adds new flowers
Estimate costcos cost of equity capital : Estimate Costcos cost of equity capital - How much will your dream car cost by the time you are ready to buy it?
Determine whether given hypotheses is testable and refutable : Determine whether given hypotheses is testable and refutable; if not, explain why.- The color red as seen by males is different from the color red as seen by females.
Evaluate symmetrical key and public key encryption methods : Evaluate the symmetrical key and public key encryption methods, and select the most appropriate for use in the network for secure data transmission.
Describe the coding management tools of the system : Does the system enable simultaneous coding and grouping or grouping interfaced? What about auto shuffle capabilities?Does the system provide anywhere, anytime access to complete ICD-9 and ICD-10 coding guidelines and coding clinic references based ..
How many nitrogen nuclei were stopped : A beam of 168-MeV nitrogen nuclei is used for cancer therapy. If this beam is directed onto a 0.200-kg tumor and gives it a 2.00-Sv dose, how many nitrogen nuclei were stopped? (Use an RBE of 20 for heavy ions.)
What is the average annual snowfall in buffalo : Is your course instructor male or female?- What is the average annual snowfall in Buffalo, New York?- Pick a student in your class (not yourself). How old is he or she?
Develop an application that display the total domestic sales : The sales manager at Conway Enterprises wants an application that she can use to display the total domestic, total international, and total company sales made during a six-month period.

Reviews

Write a Review

Computer Network Security Questions & Answers

  What information items are included in this ticket

When the Server receives the authenticator and the ticket from the client. The server will compare the information items contained in the authenticator and the ticket to authenticate the client user's identity. Please give a detailed answer on how..

  Assignment on email harassment

Suppose you are an internal investigator for a large software development company. The Human Resources Department has requested you investigate the accusations that one employee has been harassing another over both the corporate Exchange email sys..

  What advice does fbi provide in protecting computer fraud

What advice does the FBI provide in protecting against computer fraud. Do you feel that the Government is doing sufficient job in this area. Define COBIT and it's control objective. Do you feel the frameowrk is detailed enough to serve your orgni..

  Explain how a user could utilize ads to hide data

Explain how user could utilize ADS to hide data and explain other destructive uses which exist for ADS. Determine how rootkits can be used as an alternative for data hiding and explicate why they can be used for this purpose.

  Infa 640 cryptology and data protection

Suppose that Eve runs a key server.  Alice downloads a key from the key server which Eve claims is Bob’s public key.  Bob downloads a key from the key server which Eve claims is Alice’s public key.

  Develop organizational information systems security policy

Develop an organizational information systems security policy. Include the Overview, Purpose, Scope, Policy, and Compliance sections of the policy. Present the policy in a manner that complies with standardized system policies.

  Discretionary and mandatory access control

Logic bombs, War dialing, Ping of death attack, steganography, RSA scheme, digital signature, A chain of certificates, A certificate revocation list, A trust anchor, asymmetric algorithm used by PGP, IPSec mode, IP virtual Private Networks

  List the vulnerabilities of each protection you selected

List the vulnerabilities of each protection you selected. Draw the necessary network cables between access points and switches using the drawing tools in Microsoft Word.

  Example of a poor security practice

Which of the following is not an example of a poor security practice?

  Chance to break a cryptosystem

Your task is to show that breaking the scheme is roughly as difficult as a brute-force attack against single DES. Suppose you have a few pairs of plaintext

  Examine the different levels of security

Examine the different levels of security and how an organization can provide the proper level of effort to meet each information security need and how this relates to what is in an organization's information security policy

  Establishing trust relationships between the two

Explain the key considerations behind establishing trust relationships between the two (2) domains. Suggest a method for consolidating Core Network services. Provide a plan for integrating both AD forests eliminating duplication of service wherever p..

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd