Our Services

Get 15% Discount on your First Order

[rank_math_breadcrumb]

Now that you have a sense of the structure and format of your ePortfolio, you will be accelerating your pace by creating two new sections in your ePortfolio for this module’s assignment. Follow the in

Now that you have a sense of the structure and format of your ePortfolio, you will be accelerating your pace by creating two new sections in your ePortfolio for this module’s assignment. Follow the instructions below to complete Part I and Part II of the assignment.

Part I: Cryptography

  1. Create a section titled, “Cryptography.”
  2. On the main page of the section, include a short summary of the subject.
  3. Then, you may elect to either:
    • Choose subsections incorporating coursework (e.g. discussions, assignments, journals, etc.) that pertain to the following topics from  Introduction to Cryptography (Block Ciphers); Hash Functions, Message Authentication Codes and Secure Channels; Key Distribution Protocols [Diffie-Hellman, Rivest, Shamir, Adelman (RSA)]; Key Management (Kerberos); and Public Key Infrastructure, or
    • Incorporate your  Applied Cryptography Final Project as an overarching example.
  4. Expand upon and rework the incorporated subsections or final project coursework so that they substantiate your understanding of the associated professional and ethical responsibilities for their application.
  5. Create a “Reflection” subsection within the “Cryptography” section, and compose a one- to two-page explanation of why you chose those artifacts. Provide a justification for including them in your portfolio, and discuss new insights or key understandings that may have prompted your selection. Explain how you are or foresee yourself incorporating knowledge in your professional life. Discuss how these artifacts reflect your knowledge of professionalism and ethics as they relate to cryptography.
  6. Incorporate three (3) to seven (7) researched and evaluated reference links and materials that apply to your section and subsection topics, filing them under an appropriate subsection in the “Reference Link Library” section or the “Cryptography” section of your ePortfolio.

Part II: Enterprise Security Architecture

The goal for the Architecture section will be to introduce the concept, explain its utility, and then provide valuable examples from completed coursework that may be leveraged in the future as templates.

  1. Create a section titled, “Security Architecture.”
  2. Write a short paragraph describing why Security Architecture artifacts are valuable tools for maintaining consistency and traceability in security design. For a follow-up paragraph, consider using your Assignment: Describing the Seven Layers of the SABSA Architecture from Module 1 to explain the relationship between the five main SABSA Layers. Also, consider incorporating the diagram of the SABSA 7-Layer Model and the 36-Cell Matrix from the Sherwood Text in your ePortfolio.
  3. Create a minimum of five (5) subsections incorporating coursework that pertains to the topics addressed from (Conceptual Security Architecture, Logical Security Architecture, Physical Security Architecture, Component Security Architecture and Operations). At your discretion, use as much of your own coursework as templates for the subsections accounting for each layer covered in the course.
  4. Expand upon and rework the subsections so that they substantiate your understanding of the associated professional and ethical responsibilities for their application.
  5. Create a “Reflection” subsection within the “Security Architecture” section, and compose a one- to two-page explanation of why you chose those artifacts. Provide a justification for including them in your portfolio, and discuss new insights or key understandings that may have prompted your selection. Explain how you are or foresee yourself incorporating this knowledge in your professional life. Discuss how these artifacts reflect your knowledge of professionalism and ethics as they relate to security architecture.
  6. Incorporate three (3) to seven (7) researched and evaluated reference links and materials that apply to your section and subsection topics, filing the resources under an appropriate subsection in the “Reference Link Library” section or the “Security Architecture” section of your ePortfolio.

Share This Post

Email
WhatsApp
Facebook
Twitter
LinkedIn
Pinterest
Reddit

Order a Similar Paper and get 15% Discount on your First Order

Related Questions

Foundations Of Information Systems Management (Summative Assessment: DIKW and Business Strategy) As a leader in your selected field, it is important to be able to organize and explain the resources av

Foundations Of Information Systems Management (Summative Assessment: DIKW and Business Strategy) As a leader in your selected field, it is important to be able to organize and explain the resources available within the organization. The data, information, knowledge, and wisdom (DIKW) model is a tool for knowledge management.  In this

Utilizing material from your text, along with the breadth and depth of the Internet, please provide a well-developed response for each of the three (3) questions provided below. What is the defining d

Utilizing material from your text, along with the breadth and depth of the Internet, please provide a well-developed response for each of the three (3) questions provided below. What is the defining difference between computer security and information security? Why can we argue that information security is really an application

I need a 12-page Cybersecurity Breach Analysis paper written by August 2, 2025. The paper must be 100% plagiarism-free, AI-free, and meet all assignment requirements and word count expectations (has t

I need a 12-page Cybersecurity Breach Analysis paper written by August 2, 2025. The paper must be 100% plagiarism-free, AI-free, and meet all assignment requirements and word count expectations (has to be more than 3500 words “quality work”. Please check attached file for details about the paper. 

Virtualization AssignmentSUBMIT ASSIGNMENT Start Date Jul 24, 2025, 12:00 AM Due Date Jul 30, 2025, 11:59 PM Points60RubricView RubricStatusActiveAssessment TraitsRequires LopeswriteAssessment Descrip

Virtualization AssignmentSUBMIT ASSIGNMENT Start Date Jul 24, 2025, 12:00 AM Due Date Jul 30, 2025, 11:59 PM Points60RubricView RubricStatusActiveAssessment TraitsRequires LopeswriteAssessment Description Virtualization began in the 1960s, as a method for logically dividing the system resources provided by mainframe computers between different applications. Since then, the meaning of the term

Requires LopeswriteAssessment Description Understanding all the components needed to write a technical report is essential to your program of study. Build upon the information in your “Reference List”

Requires LopeswriteAssessment Description Understanding all the components needed to write a technical report is essential to your program of study. Build upon the information in your “Reference List” assignment from Topic 2 to create a 750- to 1,000-word technical report. Include the following: A Background of the Topic – This

I have attached the screenshot of the ass below for the graph!! Question 1 (25 pts): Figure 1 Graphs for Question 1. a. In Figure 1(a), determine if the graph is simple. Also determine if ther

I have attached the screenshot of the ass below for the graph!! Question 1 (25 pts): Figure 1 Graphs for Question 1. a. In Figure 1(a), determine if the graph is simple. Also determine if there is a cycle in this graph. b. In Figure 1(a), determine if the vertices 3 and 9 are connected. If these vertices

Harnessing the Power of AI for Strategic Decision- Making: Opportunities and Challenges The objective of this assignment is to understand and analyze the role of artificial intelligence (AI), busines

Harnessing the Power of AI for Strategic Decision- Making: Opportunities and Challenges The objective of this assignment is to understand and analyze the role of artificial intelligence (AI), business intelligence (BI), and business analytics (BA) in enhancing organizational decision-making processes, while also considering the ethical and social implications. Using PowerPoint,

It is important to understand what information systems are and why they are essential for running and managing a business. It is also important to understand the different systems that support differe

It is important to understand what information systems are and why they are essential for running and managing a business. It is also important to understand the different systems that support different groups or levels of management. In addition, digital technology and the Internet play a key role in executing

It is important to understand what information systems are and why they are essential for running and managing a business. It is also important to understand the different systems that support differe

It is important to understand what information systems are and why they are essential for running and managing a business. It is also important to understand the different systems that support different groups or levels of management. In addition, digital technology and the Internet play a key role in executing