Our Services

Get 15% Discount on your First Order

[rank_math_breadcrumb]

Now that you have a sense of the structure and format of your ePortfolio, you will be accelerating your pace by creating two new sections in your ePortfolio for this module’s assignment. Follow the in

Now that you have a sense of the structure and format of your ePortfolio, you will be accelerating your pace by creating two new sections in your ePortfolio for this module’s assignment. Follow the instructions below to complete Part I and Part II of the assignment.

Part I: Cryptography

  1. Create a section titled, “Cryptography.”
  2. On the main page of the section, include a short summary of the subject.
  3. Then, you may elect to either:
    • Choose subsections incorporating coursework (e.g. discussions, assignments, journals, etc.) that pertain to the following topics from  Introduction to Cryptography (Block Ciphers); Hash Functions, Message Authentication Codes and Secure Channels; Key Distribution Protocols [Diffie-Hellman, Rivest, Shamir, Adelman (RSA)]; Key Management (Kerberos); and Public Key Infrastructure, or
    • Incorporate your  Applied Cryptography Final Project as an overarching example.
  4. Expand upon and rework the incorporated subsections or final project coursework so that they substantiate your understanding of the associated professional and ethical responsibilities for their application.
  5. Create a “Reflection” subsection within the “Cryptography” section, and compose a one- to two-page explanation of why you chose those artifacts. Provide a justification for including them in your portfolio, and discuss new insights or key understandings that may have prompted your selection. Explain how you are or foresee yourself incorporating knowledge in your professional life. Discuss how these artifacts reflect your knowledge of professionalism and ethics as they relate to cryptography.
  6. Incorporate three (3) to seven (7) researched and evaluated reference links and materials that apply to your section and subsection topics, filing them under an appropriate subsection in the “Reference Link Library” section or the “Cryptography” section of your ePortfolio.

Part II: Enterprise Security Architecture

The goal for the Architecture section will be to introduce the concept, explain its utility, and then provide valuable examples from completed coursework that may be leveraged in the future as templates.

  1. Create a section titled, “Security Architecture.”
  2. Write a short paragraph describing why Security Architecture artifacts are valuable tools for maintaining consistency and traceability in security design. For a follow-up paragraph, consider using your Assignment: Describing the Seven Layers of the SABSA Architecture from Module 1 to explain the relationship between the five main SABSA Layers. Also, consider incorporating the diagram of the SABSA 7-Layer Model and the 36-Cell Matrix from the Sherwood Text in your ePortfolio.
  3. Create a minimum of five (5) subsections incorporating coursework that pertains to the topics addressed from (Conceptual Security Architecture, Logical Security Architecture, Physical Security Architecture, Component Security Architecture and Operations). At your discretion, use as much of your own coursework as templates for the subsections accounting for each layer covered in the course.
  4. Expand upon and rework the subsections so that they substantiate your understanding of the associated professional and ethical responsibilities for their application.
  5. Create a “Reflection” subsection within the “Security Architecture” section, and compose a one- to two-page explanation of why you chose those artifacts. Provide a justification for including them in your portfolio, and discuss new insights or key understandings that may have prompted your selection. Explain how you are or foresee yourself incorporating this knowledge in your professional life. Discuss how these artifacts reflect your knowledge of professionalism and ethics as they relate to security architecture.
  6. Incorporate three (3) to seven (7) researched and evaluated reference links and materials that apply to your section and subsection topics, filing the resources under an appropriate subsection in the “Reference Link Library” section or the “Security Architecture” section of your ePortfolio.

Share This Post

Email
WhatsApp
Facebook
Twitter
LinkedIn
Pinterest
Reddit

Order a Similar Paper and get 15% Discount on your First Order

Related Questions

Review the journal article Employees Adherence to Information Security Policies, link is https://cdn.inst-fs-iad-prod.inscloudgate.net/ec5f46b2-1b12-45f2-915b-5f6549eafab9/Employees’%20adherence%20to%

Review the journal article Employees Adherence to Information Security Policies, link is https://cdn.inst-fs-iad-prod.inscloudgate.net/ec5f46b2-1b12-45f2-915b-5f6549eafab9/Employees’%20adherence%20to%20information%20security%20policies%2C%20An%20exploratory%20field%20study.pdf?token=eyJhbGciOiJIUzUxMiIsInR5cCI6IkpXVCIsImtpZCI6ImNkbiJ9.eyJyZXNvdXJjZSI6Ii9lYzVmNDZiMi0xYjEyLTQ1ZjItOTE1Yi01ZjY1NDllYWZhYjkvRW1wbG95ZWVzJUUyJTgwJTk5JTIwYWRoZXJlbmNlJTIwdG8lMjBpbmZvcm1hdGlvbiUyMHNlY3VyaXR5JTIwcG9saWNpZXMlMkMlMjBBbiUyMGV4cGxvcmF0b3J5JTIwZmllbGQlMjBzdHVkeS5wZGYiLCJ0ZW5hbnQiOiJjYW52YXMiLCJ1c2VyX2lkIjoiMTA2ODUwMDAwMDAwMDQzMzcwIiwiaWF0IjoxNzYzNTQ4NDcxLCJleHAiOjE3NjM2MzQ4NzF9.N2vrrvQr2t-MEPVDw54kLc_ZoekbOAfWUj5-WoCgT_ds070e01CRec1N_arz8LZJppTgz5rKQA9GNAcZWaQ2OQ&download=1&content_type=application%2Fpdf The essay should reflect your understanding of your textbook readings and the journal article. You are free to use any other relevant references beyond the prescribed texts. Summarize the article’s main points, and answer the following questions. What

In this chapter you learned about system architecture. This exercise helps to deepen the understanding of system architecture concepts and the process of translating logical designs into physical blue

In this chapter you learned about system architecture. This exercise helps to deepen the understanding of system architecture concepts and the process of translating logical designs into physical blueprints for information systems. Instructions: Answer the following questions: Describe the steps involved in translating a logical design into a physical blueprint

Tip Top Toys is a relatively small division of Worldwide Enterprises. Worldwide has nine other divisions, which include insurance, healthcare products, and financial planning services, to name a few.

Tip Top Toys is a relatively small division of Worldwide Enterprises. Worldwide has nine other divisions, which include insurance, healthcare products, and financial planning services, to name a few. The corporate marketing director for Worldwide has requested Tip Top’s customer shopping data to target people who might be likely to

Review the journal article, What We Talk About When We Talk About “Reasonable Cybersecurity”, by Kevin L. Miller. The essay should reflect your understanding of your textbook readings and the journal

Review the journal article, What We Talk About When We Talk About “Reasonable Cybersecurity”, by Kevin L. Miller. The essay should reflect your understanding of your textbook readings and the journal article. You are free to use any other relevant references beyond the prescribed texts. Summarize the article’s main points, and

Discuss the importance of user interfaces in technology and the principles of HCI. Objective: In this chapter you learned about the principles and best practices of designing user interfaces and sourc

Discuss the importance of user interfaces in technology and the principles of HCI. Objective: In this chapter you learned about the principles and best practices of designing user interfaces and source documents/forms. Instructions:  Choose a specific topic related to user interfaces and HCI (e.g., the importance of user research, the role

In this reflective activity, you will reflect on your understanding of how data is organized, stored, and managed, and to recognize the importance of mastering data design for systems analysts.For thi

In this reflective activity, you will reflect on your understanding of how data is organized, stored, and managed, and to recognize the importance of mastering data design for systems analysts. For this Reflection activity, research and answer the following questions: In 1000 words, how would you explain the importance of

Review the journal article about cloud security in healthcare, “Data Privacy in Cloud-assisted Healthcare Systems: State of the Art and the Future Challenges“ by Anam Sajid and Haider Abbas and provid

Review the journal article about cloud security in healthcare, “Data Privacy in Cloud-assisted Healthcare Systems: State of the Art and the Future Challenges“ by Anam Sajid and Haider Abbas and provide ALL of the following information: A summary of the article’s main points List and summarize the main areas of

Discuss the difference between a logical model and a physical model. Objective: In this chapter you learned that systems development involves creating models to understand and design information syste

Discuss the difference between a logical model and a physical model. Objective: In this chapter you learned that systems development involves creating models to understand and design information systems. This exercise explores the relationship between logical and physical models in the context of systems development. Instructions: Answer the following questions: Why is it essential

In this reflection activity, we will explore the concept of object modeling, its significance in software development, analyze the benefits of using object-oriented approaches, and consider real-world

In this reflection activity, we will explore the concept of object modeling, its significance in software development, analyze the benefits of using object-oriented approaches, and consider real-world scenarios where object modeling plays a crucial role. Begin by reviewing the object modeling information in Chapter 6. Pay attention to the key

Your supervisor manages the corporate office where you work as a systems analyst. Several weeks ago, after hearing rumors of employee dissatisfaction, they asked you to create a survey for all IT empl

Your supervisor manages the corporate office where you work as a systems analyst. Several weeks ago, after hearing rumors of employee dissatisfaction, they asked you to create a survey for all IT employees. After the responses were returned and tabulated, your supervisor was dis-appointed that many employees assigned low ratings

The computer science instructor at a local high school asked you to visit her class and give a presentation about project management. You have just a few days to prepare, and you need to develop a pre

The computer science instructor at a local high school asked you to visit her class and give a presentation about project management. You have just a few days to prepare, and you need to develop a presentation that describes project management, project management tools and techniques. Thinking about what to

Information Systems for Life: Chapter 4 Activity: Discuss the key benefits and challenges of Joint Application Development (JAD). Objective: In this chapter you learned that joint application developm

Information Systems for Life: Chapter 4 Activity: Discuss the key benefits and challenges of Joint Application Development (JAD). Objective: In this chapter you learned that joint application development (JAD) is a user-oriented technique for fact-finding and requirements engineering. This exercise strengthens the understanding of techniques used to capture a comprehensive and accurate

Activity: Discuss the importance of effective communication within systems projects. Objective: In this chapter you learned that effective communication is a critical aspect of systems projects. This

Activity: Discuss the importance of effective communication within systems projects. Objective: In this chapter you learned that effective communication is a critical aspect of systems projects. This exercise highlights the impact of effective communication on a company’s systems projects. Instructions: Research effective communication on the Project Management Institute website (  Consider the significance of communication in

A SWOT analysis categorizes an organization’s top strengths, weaknesses, opportunities, and threats into an organized list and is usually presented in a simple two-by-two grid. Tasks: From the followi

A SWOT analysis categorizes an organization’s top strengths, weaknesses, opportunities, and threats into an organized list and is usually presented in a simple two-by-two grid. Tasks: From the following list of possible corporate threats, select one (1): A disconnected, and less loyal, customer base Being leap-frogged by competitor’s technology Breach of

Information Systems for Life: Chapter 1 Activity: Discuss the Pros and Cons of “Bring Your Own Device” (BYOD) in a corporation. Objective: In this chapter you learned about the impact that the develop

Information Systems for Life: Chapter 1 Activity: Discuss the Pros and Cons of “Bring Your Own Device” (BYOD) in a corporation. Objective: In this chapter you learned about the impact that the development of mobile devices and the app ecosystem have had on systems analysts and the knowledge they have to acquire

The Impact Of Technology On Organizations Summative Assessment: Innovative Capabilities Audit Innovation is essential to an organization’s success. When evaluating an organization’s ability to mana

The Impact Of Technology On Organizations Summative Assessment: Innovative Capabilities Audit  Innovation is essential to an organization’s success. When evaluating an organization’s ability to manage technology and innovation, leaders and managers must be cognizant of (and realistic about!) the firm’s capabilities. However, measuring an organization’s capability to innovate can be challenging. The