Now that you have a sense of the structure and format of your ePortfolio, you will be accelerating your pace by creating two new sections in your

Now that you have a sense of the structure and format of your ePortfolio, you will be accelerating your pace by creating two new sections in your ePortfolio for this module’s assignment. Follow the instructions below to complete Part I and Part II of the assignment.

Part I: Cryptography

  1. Create a section titled, “Cryptography.”
  2. On the main page of the section, include a short summary of the subject.
  3. Then, you may elect to either:
    • Choose subsections incorporating coursework (e.g. discussions, assignments, journals, etc.) that pertain to the following topics from  Introduction to Cryptography (Block Ciphers); Hash Functions, Message Authentication Codes and Secure Channels; Key Distribution Protocols [Diffie-Hellman, Rivest, Shamir, Adelman (RSA)]; Key Management (Kerberos); and Public Key Infrastructure, or
    • Incorporate your  Applied Cryptography Final Project as an overarching example.
  4. Expand upon and rework the incorporated subsections or final project coursework so that they substantiate your understanding of the associated professional and ethical responsibilities for their application.
  5. Create a “Reflection” subsection within the “Cryptography” section, and compose a one- to two-page explanation of why you chose those artifacts. Provide a justification for including them in your portfolio, and discuss new insights or key understandings that may have prompted your selection. Explain how you are or foresee yourself incorporating knowledge in your professional life. Discuss how these artifacts reflect your knowledge of professionalism and ethics as they relate to cryptography.
  6. Incorporate three (3) to seven (7) researched and evaluated reference links and materials that apply to your section and subsection topics, filing them under an appropriate subsection in the “Reference Link Library” section or the “Cryptography” section of your ePortfolio.

Part II: Enterprise Security Architecture

The goal for the Architecture section will be to introduce the concept, explain its utility, and then provide valuable examples from completed coursework that may be leveraged in the future as templates.

  1. Create a section titled, “Security Architecture.”
  2. Write a short paragraph describing why Security Architecture artifacts are valuable tools for maintaining consistency and traceability in security design. For a follow-up paragraph, consider using your Assignment: Describing the Seven Layers of the SABSA Architecture from Module 1 to explain the relationship between the five main SABSA Layers. Also, consider incorporating the diagram of the SABSA 7-Layer Model and the 36-Cell Matrix from the Sherwood Text in your ePortfolio.
  3. Create a minimum of five (5) subsections incorporating coursework that pertains to the topics addressed from (Conceptual Security Architecture, Logical Security Architecture, Physical Security Architecture, Component Security Architecture and Operations). At your discretion, use as much of your own coursework as templates for the subsections accounting for each layer covered in the course.
  4. Expand upon and rework the subsections so that they substantiate your understanding of the associated professional and ethical responsibilities for their application.
  5. Create a “Reflection” subsection within the “Security Architecture” section, and compose a one- to two-page explanation of why you chose those artifacts. Provide a justification for including them in your portfolio, and discuss new insights or key understandings that may have prompted your selection. Explain how you are or foresee yourself incorporating this knowledge in your professional life. Discuss how these artifacts reflect your knowledge of professionalism and ethics as they relate to security architecture.
  6. Incorporate three (3) to seven (7) researched and evaluated reference links and materials that apply to your section and subsection topics, filing the resources under an appropriate subsection in the “Reference Link Library” section or the “Security Architecture” section of your ePortfolio.

Share This Post

Email
WhatsApp
Facebook
Twitter
LinkedIn
Pinterest
Reddit

Order a Similar Paper and get 15% Discount on your First Order

Related Questions

21:26 VPN BUSA 6170 Course Project Overall Guidelines.docx Phoenix Files X Students will utilize course learning objectives in creating a compediensive MS

21:26 VPN BUSA 6170 Course Project Overall Guidelines.docx Phoenix Files X Students will utilize course learning objectives in creating a compediensive MS Word document explaining concepts, derailing calculations, and discussing recommended decisions based on their analysis of the provided data set. Ne dint quotes are accept able. Mi submitted documents