Secure Email Strategy for a fictitious organization
Secure Email Strategy for a fictitious organization
Order 100% Plagiarism Free Paper Now
Secure Email Strategy for a Fictitious Organization. Build the Secure Email Strategy for a “Fictitious” organization. You
will present this tool the leadership.
Provide an overview of the types of public-private key pairing, and show
how this provides authentication and nonrepudiation. You will also add
hashing and describe how this added security benefit ensures the
integrity of messaging.
Begin preparing your strategy by reviewing the resources I have provided
you.
hen start developing your strategy. Define these strong encryption
technologies as general principles in secure email:
Pretty Good Policy (PGP algorithm)
• GNU Privacy Guard (GPG)
• public key infrastructure (PKI)
• digital signature
• mobile device encryption (e.g., iOS encryption and Android encryption)
In your report, also consider how the use of smart card readers tied to
computer systems might be beneficial in the future enhancements to
system and data access protection. This may help you define long-term
solutions for your leadership.
Leadership does not know the costs and technical complexity of these
email encryption strategies. To further their understanding, compare the
complexities of each in relation to the security benefits, and then make
a recommendation and a deployment plan.