Reference no: EM133923687
Cryptography Algorithms and Implementation
Assessment:
Introduction
You will submit work in assignment activities during the study period. This is an individual assessment.
This assignment challenges you to apply cryptographic principles and enterprise security policies in a real-world scenario. You will demonstrate your ability to secure sensitive data at rest and in transit, maintain data integrity, and critically evaluate your implementation through a report and a video demonstration. Get online assignment help-AI & plagiarism-free-now!
Case Study:
You are a cybersecurity analyst at AquaSecure Pty Ltd, a leading Australian desalination company that supplies purified seawater to several states and territories. During a scheduled internal audit, you uncover encrypted files and logs indicating that the company has been covertly discharging toxic waste into protected marine zones off the coast of Western Australia.
The evidence includes:
Internal emails and encrypted documents.
System logs showing unauthorized waste disposal activities.
Surveillance footage stored on local servers.
You are now tasked with securely handling this evidence and reporting it to the Australian Department of Climate Change, Energy, the Environment and Water, and other relevant authorities.
Report Tasks:
Local Storage Encryption and Policy Settings
Describe how you would store the evidence securely on your work machine.
Justify your choice of encryption algorithms (e.g., AES, RSA), software tools (e.g., VeraCrypt, BitLocker), and policy settings (e.g., access control lists, key management).
Explain how your approach prevents unauthorized access and supports enterprise-level security.
Encryption in Transmission and Integrity of Data
Explain how you would transmit the evidence securely to Australian authorities.
Justify your choice of encryption protocols (e.g., PGP, TLS), communication channels, and detection mitigation strategies.
Describe how you would use cryptographic hashes (e.g., SHA-256) to ensure the integrity of the evidence during and after transmission.
Discussion and Justification
Provide a comparative analysis of the symmetric vs. asymmetric encryption methods used.
Discuss the strengths and limitations of your chosen tools and algorithms.
Reflect on how your implementation aligns with enterprise security standards and legal admissibility in Australia.
Video Demonstration
Practical Demonstration
Record a video showing you performing:
Data-at-rest encryption using your selected tools.
Secure transmission of encrypted data.
Hashing to verify data integrity.
Your face and voice must be clearly visible throughout the video.
Reflection and Learning
In the video, explain what you learned from this assignment.
Reflect on how this exercise enhanced your understanding of cryptographic implementation and enterprise security policies.
You are required to submit your solution in a report with appropriate analysis and discussion. In addition, you must submit a video of you performing the steps with appropriate applications. Your face and your voice must always appear in the video presentation.