Now that you have a sense of the structure and format of your ePortfolio, you will be accelerating your pace by creating two new sections in your

Now that you have a sense of the structure and format of your ePortfolio, you will be accelerating your pace by creating two new sections in your ePortfolio for this module’s assignment. Follow the instructions below to complete Part I and Part II of the assignment.

Part I: Cryptography

  1. Create a section titled, “Cryptography.”
  2. On the main page of the section, include a short summary of the subject.
  3. Then, you may elect to either:
    • Choose subsections incorporating coursework (e.g. discussions, assignments, journals, etc.) that pertain to the following topics from  Introduction to Cryptography (Block Ciphers); Hash Functions, Message Authentication Codes and Secure Channels; Key Distribution Protocols [Diffie-Hellman, Rivest, Shamir, Adelman (RSA)]; Key Management (Kerberos); and Public Key Infrastructure, or
    • Incorporate your  Applied Cryptography Final Project as an overarching example.
  4. Expand upon and rework the incorporated subsections or final project coursework so that they substantiate your understanding of the associated professional and ethical responsibilities for their application.
  5. Create a “Reflection” subsection within the “Cryptography” section, and compose a one- to two-page explanation of why you chose those artifacts. Provide a justification for including them in your portfolio, and discuss new insights or key understandings that may have prompted your selection. Explain how you are or foresee yourself incorporating knowledge in your professional life. Discuss how these artifacts reflect your knowledge of professionalism and ethics as they relate to cryptography.
  6. Incorporate three (3) to seven (7) researched and evaluated reference links and materials that apply to your section and subsection topics, filing them under an appropriate subsection in the “Reference Link Library” section or the “Cryptography” section of your ePortfolio.

Part II: Enterprise Security Architecture

The goal for the Architecture section will be to introduce the concept, explain its utility, and then provide valuable examples from completed coursework that may be leveraged in the future as templates.

  1. Create a section titled, “Security Architecture.”
  2. Write a short paragraph describing why Security Architecture artifacts are valuable tools for maintaining consistency and traceability in security design. For a follow-up paragraph, consider using your Assignment: Describing the Seven Layers of the SABSA Architecture from Module 1 to explain the relationship between the five main SABSA Layers. Also, consider incorporating the diagram of the SABSA 7-Layer Model and the 36-Cell Matrix from the Sherwood Text in your ePortfolio.
  3. Create a minimum of five (5) subsections incorporating coursework that pertains to the topics addressed from (Conceptual Security Architecture, Logical Security Architecture, Physical Security Architecture, Component Security Architecture and Operations). At your discretion, use as much of your own coursework as templates for the subsections accounting for each layer covered in the course.
  4. Expand upon and rework the subsections so that they substantiate your understanding of the associated professional and ethical responsibilities for their application.
  5. Create a “Reflection” subsection within the “Security Architecture” section, and compose a one- to two-page explanation of why you chose those artifacts. Provide a justification for including them in your portfolio, and discuss new insights or key understandings that may have prompted your selection. Explain how you are or foresee yourself incorporating this knowledge in your professional life. Discuss how these artifacts reflect your knowledge of professionalism and ethics as they relate to security architecture.
  6. Incorporate three (3) to seven (7) researched and evaluated reference links and materials that apply to your section and subsection topics, filing the resources under an appropriate subsection in the “Reference Link Library” section or the “Security Architecture” section of your ePortfolio.

Share This Post

Email
WhatsApp
Facebook
Twitter
LinkedIn
Pinterest
Reddit

Order a Similar Paper and get 15% Discount on your First Order

Related Questions

 Please respond to the DQ prompt in the attachment 2Please respond to this posts. All responses require a 300 word count, 2 resources and a bible

 Please respond to the DQ prompt in the attachment  2 Please respond to this posts. All responses require a 300 word count, 2 resources and a bible verse Cesare Bonesana Marchese Di Beccaria is known as “The Father of Classical Criminology” (liberty.univerersity.instructure.com).Italian Economist and Criminologist, Philosopher, and Statesman. (link.springer.com.2017) Cesare

1-2 Short Paper: Psychological TestingAfter reading Psychological Testing and AssessmentChapters 1 and 2, “The Mismeasure of Man,” and the APA Ethical

1-2 Short Paper: Psychological TestingAfter reading Psychological Testing and AssessmentChapters 1 and 2, “The Mismeasure of Man,” and the APA Ethical Principles of Psychologists Standard 9: Assessment in the module resources, write a short paper that considers the following questions: How do psychological tests differ; what are the different types? How

Assignment #4: Final  Target:  Identify, analyze, and evaluate quantitative and qualitative healthcare data and information for effective decision making

Assignment #4: Final  Target:  Identify, analyze, and evaluate quantitative and qualitative healthcare data and information for effective decision making in various healthcare settings  Explain data to a health care audience in a clear, concise and persuasive manner, consistent with best practices in the field of health care management to inform

What’s the Cons of prescribing  an Alpha Adrenergic Agonist to patient below.  Case Study for Week 6 DiscussionPatient 1:Malcolm is a 9-year-old male in

What’s the Cons of prescribing  an Alpha Adrenergic Agonist to patient below.  Case Study for Week 6 DiscussionPatient 1:Malcolm is a 9-year-old male in the 4th grade at the public elementary school. Malcolmhas recently been diagnosed with ADHD, combined presentation. Malcolm struggleswith being fidgety and hyperactive; he often gets into