Now that you have a sense of the structure and format of your ePortfolio, you will be accelerating your pace by creating two new sections in your

Now that you have a sense of the structure and format of your ePortfolio, you will be accelerating your pace by creating two new sections in your ePortfolio for this module’s assignment. Follow the instructions below to complete Part I and Part II of the assignment.

Part I: Cryptography

  1. Create a section titled, “Cryptography.”
  2. On the main page of the section, include a short summary of the subject.
  3. Then, you may elect to either:
    • Choose subsections incorporating coursework (e.g. discussions, assignments, journals, etc.) that pertain to the following topics from  Introduction to Cryptography (Block Ciphers); Hash Functions, Message Authentication Codes and Secure Channels; Key Distribution Protocols [Diffie-Hellman, Rivest, Shamir, Adelman (RSA)]; Key Management (Kerberos); and Public Key Infrastructure, or
    • Incorporate your  Applied Cryptography Final Project as an overarching example.
  4. Expand upon and rework the incorporated subsections or final project coursework so that they substantiate your understanding of the associated professional and ethical responsibilities for their application.
  5. Create a “Reflection” subsection within the “Cryptography” section, and compose a one- to two-page explanation of why you chose those artifacts. Provide a justification for including them in your portfolio, and discuss new insights or key understandings that may have prompted your selection. Explain how you are or foresee yourself incorporating knowledge in your professional life. Discuss how these artifacts reflect your knowledge of professionalism and ethics as they relate to cryptography.
  6. Incorporate three (3) to seven (7) researched and evaluated reference links and materials that apply to your section and subsection topics, filing them under an appropriate subsection in the “Reference Link Library” section or the “Cryptography” section of your ePortfolio.

Part II: Enterprise Security Architecture

The goal for the Architecture section will be to introduce the concept, explain its utility, and then provide valuable examples from completed coursework that may be leveraged in the future as templates.

  1. Create a section titled, “Security Architecture.”
  2. Write a short paragraph describing why Security Architecture artifacts are valuable tools for maintaining consistency and traceability in security design. For a follow-up paragraph, consider using your Assignment: Describing the Seven Layers of the SABSA Architecture from Module 1 to explain the relationship between the five main SABSA Layers. Also, consider incorporating the diagram of the SABSA 7-Layer Model and the 36-Cell Matrix from the Sherwood Text in your ePortfolio.
  3. Create a minimum of five (5) subsections incorporating coursework that pertains to the topics addressed from (Conceptual Security Architecture, Logical Security Architecture, Physical Security Architecture, Component Security Architecture and Operations). At your discretion, use as much of your own coursework as templates for the subsections accounting for each layer covered in the course.
  4. Expand upon and rework the subsections so that they substantiate your understanding of the associated professional and ethical responsibilities for their application.
  5. Create a “Reflection” subsection within the “Security Architecture” section, and compose a one- to two-page explanation of why you chose those artifacts. Provide a justification for including them in your portfolio, and discuss new insights or key understandings that may have prompted your selection. Explain how you are or foresee yourself incorporating this knowledge in your professional life. Discuss how these artifacts reflect your knowledge of professionalism and ethics as they relate to security architecture.
  6. Incorporate three (3) to seven (7) researched and evaluated reference links and materials that apply to your section and subsection topics, filing the resources under an appropriate subsection in the “Reference Link Library” section or the “Security Architecture” section of your ePortfolio.

Share This Post

Email
WhatsApp
Facebook
Twitter
LinkedIn
Pinterest
Reddit

Order a Similar Paper and get 15% Discount on your First Order

Related Questions

Sure, here is an overview of how the business case method is used in change management to explore strategic alternatives and their potential impact on

Sure, here is an overview of how the business case method is used in change management to explore strategic alternatives and their potential impact on future outcomes: ### **Change Management and Strategic Alternatives** **1. Understanding Change Management:**Change management involves preparing, supporting, and helping individuals, teams, and organizations in making organizational

Overview An important aspect of a change management strategy is to consider how different alternatives may impact future outcomes. Organizations often use

Overview An important aspect of a change management strategy is to consider how different alternatives may impact future outcomes. Organizations often use the business case method to explore strategic alternatives as it helps simulate a real situation. Such simulations help with identifying business issues and provide critical information that organizations

Read: Organizational Theory in Higher Education: Chapters 1, 2, and 3 Teaching, Learning, and Research in Higher Education: Chapter: 1Required

Read:  Organizational Theory in Higher Education: Chapters 1, 2, and 3 Teaching, Learning, and Research in Higher Education: Chapter: 1 Required Textbook(s): Organizational Theory in Higher Education – 978-0415874663 Teaching, Learning and Research in Higher Education: A Critical Approach – 978-0415962636 Publication Manual of the American Psychological Association (7th Edition)

Hi all, I need some help with the attached files.  Details inside.  Thanks!Introduction             Global Energy Services is

Hi all, I need some help with the attached files.  Details inside.  Thanks! Introduction             Global Energy Services is dealing with the various challenges within the economic, environmental, and social domains. Challenges include falling oil prices that affect revenues and shareholders’ expectations, which are associated with the challenge of meeting

Please help with my assignmentModule 3 – CaseCONFLICT AND NEGOTIATIONAssignment

Please help with my assignment Module 3 – Case CONFLICT AND NEGOTIATION Assignment Overview Types of Conflicts According to Deng, Zhang, and Fan (2021), channel conflicts (between manufacturers and distributors) are categorized as functional or dysfunctional.  Functional conflict refers to differences in opinions between a manufacturer and a distributor regarding