NOTE: This assignment has 4 PARTS.
Each part MUST HAVE SIX Pages (not including the index and reference page) with 5 citations
in APA 7 format (Total of 24 pages and 20 citations/references)
PART 1 – CIA Triad Analysis
Upper management has asked you to provide an analysis of information security technologies specifically related to Confidentiality, Integrity, and Availability, along with trusted computing.
MUST HAVE
Write a paper to demonstrate that:
You are able to understand and apply these common information security concepts
Must include an analysis that addresses the breadth and coverage of information security regarding people, processes, and technologies.
CONCLUSION
PART 2 – Cryptographic Tools
You work for an organization that is in the defense-contracting field. The federal government audited your organization, as part of doing business with it, and you failed to meet the following requirements.
• Web traffic to and from the server is in plain text.
• There are some sensitive emails also being sent outside of organizations that are not encrypted.
MUST HAVE
Your manager has assigned you to remedy the situation.
Write a proposal to resolve these issues
Identify solutions
Cost to implement the solutions
CONCLUSION
PART 3 – Software Security Report
Your CIO is currently concerned about malware (viruses, worms, Trojan horses, etc.), that could cripple your organization.
MUST HAVE
She asked you to:
Describe the ways in which different malware functions.
Provide at least one example demonstrating how a particular virus has affected one or more organizations.
CONCLUSION.
PART 4 – Operating System Security Report
The organization you work for currently lacks operating system security and uses various Windows and Linux systems that run various Enterprise Resource Planning software. Your CIO is concerned that sensitive data on the servers is at risk.
MUST HAVE
She asks you to write a report including:
Detailing a defense in depth approach for securing data on both Windows and Linux operating systems.
Consider all standards and processes required to secure the various operating systems.
Include at least one security control for each layer of defense.
CONCLUSION.