IT255 Unit 7 Assignment 1
3 Pages

IT255 Unit 7 Assignment 1

Course Number: IT Network, Spring 2013

College/University: ITT Tech Flint

Word Count: 512

Rating:

Document Preview

Unit 7 Assignment 1: Select Appropriate Encryption Algorithms 1. Shovels and Shingles is a small construction company consisting of 12 computers that have Internet access. The company's biggest concern is that a wily competitor will send e-mail messages pretending to be from Shovels and Shingles in order to get confidential information. Select an encryption solution that best prevents a competitor from receiving...

Unformatted Document Excerpt
Coursehero >> Michigan >> ITT Tech Flint >> IT Network

Course Hero has millions of student submitted documents similar to the one
below including study guides, practice problems, reference materials, practice exams, textbook help and tutor support.

Course Hero has millions of student submitted documents similar to the one below including study guides, practice problems, reference materials, practice exams, textbook help and tutor support.

7 Unit Assignment 1: Select Appropriate Encryption Algorithms 1. Shovels and Shingles is a small construction company consisting of 12 computers that have Internet access. The company's biggest concern is that a wily competitor will send e-mail messages pretending to be from Shovels and Shingles in order to get confidential information. Select an encryption solution that best prevents a competitor from receiving confidential information and justify the recommendation. Recommendation: For this scenario I would use a Digital Signature. The validity of a digital signature gives the recipient reason to believe that a known sender created the message, and that it was not altered in transit. 2. Top Ads is a small advertising company consisting of 12 computers that have Internet access. All employees communicate using smartphones. Top Ads primary concern is protecting the data on the smartphones. Select an encryption solution that best protects the smartphones and justify the recommendation. Recommendation: I will recommend using Advanced Encryption Standard. Most applications and programs designed to encrypt smartphones and PDAs are based on 256-bit AES. It is extremely effective and many devices from smart cards to high performance computers support it. 3. NetSecIT is a multinational IT services company consisting of 120,000 computers that have Internet access and 45,00 servers. All employees work from home and travel extensively. NetSecIT would like to implement an asymmetric general-purpose encryption technology that is very difficult to break and has a compact design so that there is not a lot of overhead. Select an encryption solution that meets the companys needs and justify the I recommendation. Recommendation: recommend using the Elliptic Curve Cryptography (ECC). It is an encryption method in which elliptic curves can be used to calculate simple but very difficult to break encryption keys. ECC has a very compact design, for example an ECC key of 160-bit is equal in strength to a 1024-bit RSA key. 4. Backordered Parts is a defense contractor that builds communication parts for the military. The employees use mostly Web-based applications for parts design and information sharing. Due to the sensitive nature of the business, Backordered Parts would like to implement a solution that secures all browsers connections to the Web servers. Select an encryption solution that best meets the companys needs and justify the recommendation. Recommendation: I recommend using Secure Socket Layers (SSL) for their Web-based applications. SSL is designed to encrypt information transferred between computers and the server to prevent any type of monitoring. 5. Confidential Services Inc. is a military support branch consisting of 14,000,000 computers with Internet access and 250,000 servers. All employees must have security clearances. They communicate mainly through internally secured systems. Confidential Services Inc. is concerned that sensitive information may inadvertently be exposed and wants to implement a symmetric file encryption algorithm that is strong but fast. Select an encryption solution that best meets the companys needs and justify the recommendation. Recommendation: This company needs to use the Advanced Encryption Standard. It is the standard adopted by the U.S government is a strong symmetric algorithm key that is fast both in software and hardware.
MOST POPULAR MATERIALS FROM IT Network
MOST POPULAR MATERIALS FROM IT
MOST POPULAR MATERIALS FROM ITT Tech Flint