Select a real or business engaged in e-business and outline its offerings and/or services.

Description


Cryptography Security Best Practices and Resources
Through this two-part project, you will a “Cryptography Security Best Practices and Resources” presentation. This project be an excellent addition to your portfolio and serve as a professional reference for the future. The topics in your presentation will follow and upon the weekly assigned materials and activities. Please use the following steps to your project deliverables.
For best results, work on your project every week. Plan to dedicate 1 to 2 hours per week to this project. DO NOT WAIT UNTIL THE
LAST DAY to write your project. See the Syllabus section “Due Dates for Assignments & Exams” for due date information.
Step 1: Establish a target audience and for your presentation. Select a real or business engaged in e-business and outline its offerings and/or services. Next, outline the categories of that may require applications. This will provide focus to your research. Optionally, you select an industry.
Step 2: Assume you are the Director of Security for the identified in Step 1. You have been asked to provide an briefing to middle and management on the topic of cryptography and how it should be in this environment. Think about what is and/or interesting to the management team
Step 3: Develop your executive briefing. Assume one or two PowerPoint slides per topic. Below is a proposed topic outline for your briefing.
Consider using about eight topics. Your briefing should last about 15 minutes, as if it were being presented live. You should also create a Word document (6 pages), which will expand upon the concepts in more detail than the PPT. You will be submitting two items to your Dropbox: the
PowerPoint and the Word document.
Feasible Attacks
Protection Through Cryptography
The Applications of Keys
Attacks on Encrypted Data and Keys
Digital Encryption Standards
Password-Based Encryption
Good Passwords
Crypto Accelerators
Biometrics
Using a Trusted Third Party
How Public-Key Cryptography Works
Comparing the Algorithms (RSA, DH, and ECDH )
Key Recovery
Use of Digital Signatures
Digital Signatures and Non-Repudiation
Digital Signatures and Authentication
See below for the grading rubric that will be used for both Parts A and B. Proper citations are required!
This is a continuation from Part A. Follow the same format and style as you developed in Part A.
Step 4: Develop your executive briefing. Assume one or two PowerPoint slides per topic. Below is a proposed topic outline for your briefing. Consider using about eight topics. Your briefing should last about 15 minutes, as if it were being presented live. You should also create a Word
document (6 pages), which will expand upon the concepts in more detail than the PPT. You will be submitting two items to your Dropbox: the PowerPoint and the Word document.
Public Key Infrastructures
Dealing with the Legal Environment
Internet Protocol Security and Architecture
Integrity Check Value Calculation
The Encapsulating Security Payload Protocol
Security Associations and Databases
Internet Key Exchange
Secure Sockets Layer
Cryptographic Computations
S/MIME Functionality
Secure Electronic Transaction (SET)
Cryptographic Accelerators
Smart Cards
Biometrics
Learning Lesson Form Break-Ins
Law Enforcement
Non-Repudiation
Standards, Guidelines, and Regulations

"Get 15% discount on your first 3 orders with us"
Use the following coupon
FIRST15

Order Now