Security Technology Deployment Plan
Security Technology Deployment Plan
Order 100% Plagiarism Free Paper Now
Security Technology Deployment Plan for Company XYZ. The paper evaluates the security deployment plan for company XYZ, in a semi-conductor manufacturing industry. The paper is structured in 6 different phases. The paper sets out by discussing the IT system architecture, then plan of protection. The third step highlights encryption technologies that will assist XYZ to protect intellectual property while maintaining competitive edge. In the fourth step, the paper provides network security and threat table followed by email security mechanisms. In the end, the discussion presents recommendations to the company leadership for safeguarding its network resources.
References
Altigani, A., Abdelmagid, M., & Barry, B. (2016). Analyzing the Performance of the Advanced Encryption Standard Block Cipher Modes of Operation: Highlighting the National Institute of Standards and Technology Recommendations. Indian Journal of Science and Technology, 9(28).
Anugurala, A., & Chopra, A. (2016, December). Securing and preventing man in middle attack in grid using open pretty good privacy (PGP). In Parallel, Distributed and Grid Computing (PDGC), 2016 Fourth International Conference on (pp. 517-521). IEEE. Retrieved from https://ieeexplore.ieee.org/abstract/document/7913249/
Callas, J. 92017).Triple DES: How strong is the data encryption standard? Retrieved on September, 4 2018 from https://searchsecurity.techtarget.com/tip/Expert-advice Encryption-101-Triple-ES-explained
Cisco. (n.d).What Is Network Security? Retrieved on September 4, 2018 from https://www.cisco.com/c/en/us/products/security/what-is-network-security.html
Faz-Hernández, A., Fujii, H., Aranha, D. F., & López, J. (2017, December). A Secure and Efficient Implementation of the Quotient Digital Signature Algorithm (qDSA). In International Conference on Security, Privacy, and Applied Cryptography Engineering (pp. 170-189). Springer, Cham. DOI https://doi.org/10.1007/978-3-319-71501-8_10
Genkin, D., Shamir, A., & Tromer, E. (2014, August). RSA key extraction via low-bandwidth acoustic cryptanalysis. In International cryptology conference (pp. 444-461). Springer, Berlin, Heidelberg.
Kushwah, V., Tiwari, S., & Gautam, M. (2016). A review study on digital watermarking techniques. International Journal of Current Engineering and Scientific Research, 3(1), 189-193
Microsoft. (n.d). Text block. Retrieved on September, 4 2018 from https://docs.microsoft.com/en-us/uwp/api/windows.ui.xaml.controls.textblock
Rodriguez-Clark, D. (2017). Caesar Shift Cipher. Retrieved September 4, 2017 from http://crypto.interactive-maths.com/caesar-shift-cipher.html#encrypt
Rouse, M. (2014). PKI (public key infrastructure). Retrieved on September, 4 2018 from https://searchsecurity.techtarget.com/definition/PKI
Sabnis, S. K., & Awale, R. N. (2016). Statistical Steganalysis of High Capacity Image Steganography with Cryptography. Procedia Computer Science, 79, 321-327. https://doi.org/10.1016/j.procs.2016.03.042
Sarada, G., Abitha, N., Manikandan, G., & Sairam, N. (2015, March). A few new approaches for data masking. In Circuit, Power and Computing Technologies (ICCPCT), 2015 International Conference on (pp. 1-4). IEEE.
Sugumar, R., & Imam, S. B. S. (2015). Symmetric encryption algorithm to secure outsourced data in public cloud storage. Indian Journal of Science and Technology, 8(23).
Sumathi, C. P., Santanam, T., & Umamaheswari, G. (2014). A study of various steganographic techniques used for information hiding. arXiv preprint arXiv:1401.5561.