Security Technology Deployment Plan for Company XYZ

 

Value For Money

Key To Success

Key To Success

Security Technology Deployment Plan

Order 100% Plagiarism Free Paper Now

Security Technology Deployment Plan for Company XYZ. The paper evaluates the security deployment plan for company XYZ, in a semi-conductor manufacturing industry. The paper is structured in 6 different phases. The paper sets out by discussing the IT system architecture, then plan of protection. The third step highlights encryption technologies that will assist XYZ to protect intellectual property while maintaining competitive edge. In the fourth step, the paper provides network security and threat table followed by email security mechanisms. In the end, the discussion presents recommendations to the company leadership for safeguarding its network resources.


References
Altigani, A., Abdelmagid, M., & Barry, B. (2016). Analyzing the Performance of the Advanced    Encryption Standard Block Cipher Modes of Operation: Highlighting the National    Institute of Standards and Technology Recommendations. Indian Journal of Science and    Technology, 9(28).
Anugurala, A., & Chopra, A. (2016, December). Securing and preventing man in middle attack    in grid using open pretty good privacy (PGP). In Parallel, Distributed and Grid    Computing (PDGC), 2016 Fourth International Conference on (pp. 517-521). IEEE.    Retrieved from https://ieeexplore.ieee.org/abstract/document/7913249/
Callas, J. 92017).Triple DES: How strong is the data encryption standard? Retrieved on    September, 4 2018 from https://searchsecurity.techtarget.com/tip/Expert-advice    Encryption-101-Triple-ES-explained
Cisco. (n.d).What Is Network Security? Retrieved on September 4, 2018 from    https://www.cisco.com/c/en/us/products/security/what-is-network-security.html
Faz-Hernández, A., Fujii, H., Aranha, D. F., & López, J. (2017, December). A Secure and    Efficient Implementation of the Quotient Digital Signature Algorithm (qDSA). In    International Conference on Security, Privacy, and Applied Cryptography Engineering    (pp. 170-189). Springer, Cham. DOI https://doi.org/10.1007/978-3-319-71501-8_10
Genkin, D., Shamir, A., & Tromer, E. (2014, August). RSA key extraction via low-bandwidth    acoustic cryptanalysis. In International cryptology conference (pp. 444-461). Springer,    Berlin, Heidelberg.
Kushwah, V., Tiwari, S., & Gautam, M. (2016). A review study on digital watermarking    techniques. International Journal of Current Engineering and Scientific Research, 3(1),    189-193
Microsoft. (n.d). Text block. Retrieved on September, 4 2018 from     https://docs.microsoft.com/en-us/uwp/api/windows.ui.xaml.controls.textblock
Rodriguez-Clark, D. (2017). Caesar Shift Cipher. Retrieved September 4, 2017 from    http://crypto.interactive-maths.com/caesar-shift-cipher.html#encrypt
Rouse, M. (2014). PKI (public key infrastructure). Retrieved on September, 4 2018 from    https://searchsecurity.techtarget.com/definition/PKI
Sabnis, S. K., & Awale, R. N. (2016). Statistical Steganalysis of High Capacity Image    Steganography with Cryptography. Procedia Computer Science, 79, 321-327.    https://doi.org/10.1016/j.procs.2016.03.042
Sarada, G., Abitha, N., Manikandan, G., & Sairam, N. (2015, March). A few new approaches for    data masking. In Circuit, Power and Computing Technologies (ICCPCT), 2015    International Conference on (pp. 1-4). IEEE.
Sugumar, R., & Imam, S. B. S. (2015). Symmetric encryption algorithm to secure outsourced    data in public cloud storage. Indian Journal of Science and Technology, 8(23).
Sumathi, C. P., Santanam, T., & Umamaheswari, G. (2014). A study of various steganographic    techniques used for information hiding. arXiv preprint arXiv:1401.5561.

Security Technology Deployment Plan

Order 100% Plagiarism Free Paper Now

Share this

Order Dissert Now

Order Dissert Now

We Guarantee

We Guarantee
 
error: Content is protected !!