Develop a plan to deploy public key infrastructure


Assignment

Length: 12 pages.

Research a company or organization and their Cyber Security Plan to address 3-5 specific issues from the following list.

• Technologies- What might be the effects of not using encryption on network or Internet traffic?

• Create a plan for the implementation of secure (encrypted) e-mail in an organization.

• Evaluate biometric controls: You want to install a biometric access control outside of a restricted room in your facility. You are considering a retina pattern system and a voice recognition system.

• Develop a plan to deploy public key infrastructure (PKI) and encryption solutions to protect data and information.

• Identify countermeasures to minimize company information exposure on social networking sites. What are the steps or countermeasures you would recommend minimizing the level of information exposure? Passwords and Social Networking: Compare and contrast password strength versus a password manager.

• Evaluate port scanning countermeasures- You are evaluating port scanning countermeasures to help prevent an attacker from acquiring information about your network. The options you are considering are the deny-all approach, firewall testing, and security awareness.

• Analyze a set of security risks and determine the appropriate physical, technical, and administrative controls to protect against those risks.

• develop a plan for a business that needs to upgrade its video surveillance system. Research the various types of cameras, viewing, and recording equipment available, and develop a detailed plan for camera placement, image retention, and monitoring.

• Develop a disaster recovery plan.

• Develop cyber security awareness program

Describe the company, their Cyber Security Plan, and the issues in your group paper while including recommendations to improve issues.

Format your assignment according to the give formatting requirements:

1. The answer must be double spaced, typed, using Times New Roman font (size 12), with one-inch margins on all sides.

2. The response also includes a cover page containing the title of the assignment, the course title, the student's name, and the date. The cover page is not included in the required page length.

3. Also include a reference page. The references and Citations should follow APA format. The reference page is not included in the required page length.

Request for Solution File

Ask an Expert for Answer!!
Business Management: Develop a plan to deploy public key infrastructure
Reference No:- TGS03114314

Expected delivery within 24 Hours