Cryptography Assignments | Online Homework Help

There are six steps that will lead you through this project. After beginning with the workplace scenario, continue to Step 1: “IT Systems Architecture.”

Don't use plagiarized sources. Get Your Assignment on
Cryptography Assignments | Online Homework Help
Just from $13/Page
Order Now

The deliverables for this project are as follows:
professional writing services near me

  1. Create a single report in Word document format. This report should be about 10 pages long, double-spaced, with citations in APA format. Page count does not include diagrams or tables. The report must cover the following:
    • network security and threat table
    • Common Access Card deployment strategy
    • e-mail security strategy
  2. CYB610 Project 5 -Outline


    You are an enterprise security architect for a company in a semiconductor manufacturing industry where maintaining competitive advantage and protecting intellectual property is vital.  You’re in charge of security operations and strategic security planning. Your responsibilities include devising the security protocols for identification, access, and authorization management.    You recently implemented cryptography algorithms to protect the information organization.  Leadership is pleased with your efforts and would like you to take protection methods even further. They’ve asked you to study cyber­attacks against different cryptography mechanisms and deploy access control programs to prevent those types of attacks.    We’d like you to create plans for future security technology deployments, says one senior manager. And provide documentation so that others can carry out the deployments. A director chimes in, but you should also devise a method for ensuring the identification, integrity, and nonrepudiation of information in    transit at rest and in use within the organization. As the enterprise security architect, you are responsible for providing the following deliverables.  Create a network security vulnerability and threat table in which you outline the security architecture of the organization, the cryptographic means of protecting the assets of the organizations, the types of known attacks against those protections, and means to ward off the attacks. This document will help you manage the current configuration of the security architecture. Create a Common Access Card, CAC deployment strategy, in which you describe the CAC implementation and deployment and encryption methodology for information security professionals. Create an email security strategy in which you provide the public key, private key hashing methodology to determine the best key management system for your organization.  These documents will provide a security overview for the leadership in your company.

    Encryption uses cryptographic algorithms to obfuscate data. These complex algorithms transform data from human readable plaintext into encrypted cipher text. Encryption uses the principles of substitution and permutation to ensure that data is transformed in a non-deterministic manner by allowing the user to select the password or a key to encrypt a message. The recipient must know the key in order to decrypt the message, translating it back into the human readable plaintext.

    Step 1: IT Systems Architecture

    You are a senior-level employee and you must tailor your deliverables to suit your audience: the leadership of the organization. You may choose to use a fictitious organization, or model your organization on an existing organization, including proper citations.

    Leadership is not familiar with the architecture of the IT systems, nor are they familiar with the types of threats that are likely or the security mechanisms in place to ward off those threats. You will provide this information in tabular format and call it the Network Security and Vulnerability Threat Table.

    Now you’re ready to create your table. Include and define the following components of security in the architecture of your organization, and explain if threats to these components are likely, or unlikely:

    LAN security

    identity management

    physical security

    personal security



    Next, review the different types of cyberattacks described in the following resource: cyberattacks. As you’re reading take note of which attacks are most likely to affect your organization. Then list the security defenses you employ in your organization to mitigate these types of attacks. Include this information in your Network Security and Vulnerability Threat Table.

    Step 2: (Lab)

    Step 3: Data Hiding Technologies

    You will describe to your organization the various cryptographic means of protecting its assets. Select the links below to review encryption techniques and encryption technologies, then provide your organization with a brief overview of each.

    Encryption Technologies

    Shift / Caesar cipher

    Polyalphabetic cipher

    One time pad cipher/Vernam cipher/perfect cipher

    Block ciphers

    triple DES


    Advanced Encryption Standard (AES)

    Symmetric encryption

    Text block coding

    Data Hiding Technologies

    Information hiding and steganography

    Digital watermarking

    Masks and filtering

    These descriptions will be included in the network security vulnerability and threat table for leadership.

    Step 4: Creating the Network Security Vulnerability and Threat Table

    Using the information you’ve gathered from the previous steps, prepare the network security vulnerability and threat table, in which you outline the following:

    security architecture of the organization

    the cryptographic means of protecting the assets of the organization

    the types of known attacks against those types of protections

    means to ward off the attacks

    Create your Network Security Vulnerability and Threat Table, and include it in your submission to the organization. Please refer to this threat table template for guidance on creating this document.

    Step 5: Access Control Based on Smart Card Strategies

    Smart cards use encryption chips to identify the user, their identity, role, and sometimes use their personal identifiable information (PII). Two examples of smart cards are the federal government’s use of common access cards (CACs), and the financial sector’s use of encryption chips in credit cards.

    You have completed your threat table, and you’ve decided that you want to modernize the access control methods for your organization. To that end, you read the following resources to gather some background information on access control and the various encryption schemas associated with the Common Access Card (CAC):

    Access control

    Common access Card (CAC)

    You plan to deploy CAC to the company and you are tasked with devising that CAC deployment strategy, which includes the cryptographic solutions used with the CAC.

    In the Common Access Card Deployment Strategy final deliverable, describe how identity management would be a part of your overall security program and your CAC deployment plan:

    Create your Common Access Card Deployment Strategy and include it in your submission to the organization.

    Step 6: The Email Security Strategy

    After completing the CAC, your next step is to build the Secure Email Strategy for the organization. You will present this tool to your leadership.

    Provide an overview of the types of public-private key pairing, and show how this provides authentication and nonrepudiation. You will also add hashing, and describe how this added security benefit ensures the integrity of messaging.

    Begin preparing your strategy by reviewing the following resources that will aid you in becoming well informed on encryption technologies for e-mail:

    Public Key Infrastructure (PKI)

    iOS encryption

    Blackberry encryption

    Then start developing your strategy.  Define these strong encryption technologies as general principles in secure email:

    Pretty Good Policy (PGP algorithm)

    GNU Privacy Guard (GPG)

    Public Key Infrastructure (PKI)

    Digital signature

    Mobile device encryption (e.g., iOS encryption and Blackberry encryption)

    In your report, also consider how the use of smart card readers tied to computer systems might be beneficial in the future enhancements to system and data access protection. This may help you define long-term solutions for your leadership.

    Leadership does not know the costs and technical complexity of these email encryption strategies. To further their understanding, compare the complexities of each in relation to the security benefits, and then make a recommendation and a deployment plan.

    The deliverables for this project are as follows:

    Create a single report in Word document format. This report should be about 10 pages long, double-spaced, with citations in APA format. Page count does not include diagrams or tables. The report must cover the following:

    network security and threat table

    Common Access Card deployment strategy

    e-mail security strategy

    In a Word document, share your lab experience and provide screenshots to demonstrate that you performed the lab.

    Submit your deliverables to the assignment folder.

Calculate your paper price
Pages (550 words)
Approximate price: -

Why Choose Us

Quality Papers

At, we always aim at 100% customer satisfaction. As such, we never compromise o the quality of our homework services. Our homework helpers ensure that they craft each paper carefully to match the requirements of the instruction form.

Professional Academic Writers

With, every student is guaranteed high-quality, professionally written papers. We ensure that we hire individuals with high academic qualifications who can maintain our quality policy. These writers undergo further training to sharpen their writing skills, making them more competent in writing academic papers.

Affordable Prices

Our company maintains a fair pricing system for all academic writing services to ensure affordability. Our pricing system generates quotations based on the properties of individual papers.

On-Time delivery

My Homework Writers guarantees all students of swift delivery of papers. We understand that time is an essential factor in the academic world. Therefore, we ensure that we deliver the paper on or before the agreed date to give students ample time for reviewing.

100% Originality maintains a zero-plagiarism policy in all papers. As such, My Homework Writers professional academic writers ensure that they use the students’ instructions to deliver plagiarism-free papers. We are very keen on avoiding any chance of similarities with previous papers.

Customer Support 24/7

Our customer support works around the clock to provide students with assistance or guidance at any time of the day. Students can always communicate with us through our live chat system or our email and receive instant responses. Feel free to contact us via the Chat window or support email:

Try it now!

Calculate the price of your order

You will get a personal manager and a discount.
We'll send you the first draft for approval by at
Total price:

How it works?

Follow these simple steps to get your paper done

Place your order

Fill in the order form and provide all details of your assignment.

Proceed with the payment

Choose the payment system that suits you most.

Receive the final file

Once your paper is ready, we will email it to you.

Our Homework Writing Services

My Homework Writers holds a reputation for being a platform that provides high-quality homework writing services. All you need to do is provide us with all the necessary requirements of the paper and wait for quality results.


Essay Writing Services

At My Homework Writers, we have highly qualified academic gurus who will offer great assistance towards completing your essays. Our homework writing service providers are well-versed with all the aspects of developing high-quality and relevant essays.


Admission and Business Papers

With, we will help you secure a position at your desired institution. Our essay writing services include the crafting of admissions papers. We will still help you climb your career ladder by helping you write the official papers that will help you secure a job. We will guide you on how to write an outstanding portfolio or resume.


Editing and Proofreading has a professional editorial team that will help you organize your paper, paraphrase it, and eliminate any possible mistakes. Also, we will help you check on plagiarism to ensure that your final paper posses quality and originality.


Technical papers

My Homework Writers harbors professional academic writers from diverse academic disciplines. As such, we can develop homework writing services in all academic areas. The simplicity or complexity of the paper does not affect the quality of homework writing services.