Essay Available:
You are here: Home → Research Paper → IT & Computer Science
Pages:
12 pages/≈3300 words
Sources:
16 Sources
Level:
APA
Subject:
IT & Computer Science
Type:
Research Paper
Language:
English (U.S.)
Document:
MS Word
Date:
Total cost:
$ 39.95
Topic:
An Analysis Of The Security Technology Deployment Plan For Company XYZ (Research Paper Sample)
Instructions:
The paper analyzes the security deployment plan for company xyz.
Content:
Security Technology Deployment Plan
Name
Institution
Security Technology Deployment Plan
The paper evaluates the security deployment plan for company XYZ, in a semi-conductor manufacturing industry. The paper is structured in 6 different phases. The paper sets out by discussing the IT system architecture, then plan of protection. The third step highlights encryption technologies that will assist XYZ to protect intellectual property while maintaining competitive edge. In the fourth step, the paper provides network security and threat table followed by email security mechanisms. In the end, the discussion presents recommendations to the company leadership for safeguarding its network resources.
Step 1: IT Systems Architecture
Communication via local area network (LAN) is a common trend in the present world. While communication through LAN is not secure, most organizations use it since it is convenient. According to Cisco (n.d), communication of confidential information is vulnerable to attackers and other threats. It is the goal of each organization to safeguard its information against unauthorized users and malicious staff. The security of an organization’s data is based on identifying threats and addressing them to prevent access to confidential or sensitive information. For that reason, the organization should enhance its security by choosing an appropriate wireless LAN (WLAN). Specifically, the organization has to identify acceptable double connections while taking into account the security of its network. For example, to protect the organization’s network security, it is paramount to ensure that the WLAN has client devices when carrying out security assessment. The WLAN connect client devices to the computer and not directly to the network. Such an attempt is important when it comes to allowing client devices to communicate with the LAN via the wireless switch, which is easy to manage. In relation to security configuration, the organization should have a standard architecture to provide not only protection but also reduce network threats and effects of attacks by enhancing predictability and consistency of security (Cisco, n.d). In the organization, LAN security can be threatened by unauthenticated users.
Table 1. IT Systems Architecture
ComponentExplanationLikelihoodSolutionLAN securityThis is the where with the local area. The firm’s wireless LAN is vulnerable to threats from unauthorized users LikelyImplement firewall to prevent unauthenticated access.
Installing anti-spyware and adoption of intrusion prevention system (IPS)
Identity managementThis involves identification of individuals across the network and controlling access to data based on their user-level rightsLikelyImplement user level rights and password introductionPhysical securityPhysical safeguard of software, hardware, personnel and network resources from damage or lossLikelyUse back-up strategy.
Implementing locks and security staffs Personnel securityPolicies that can help in managing the risk of employees using their legal rights to access the firm’s network resourcesUnlikelyImplementation of password policy and anti-virusAvailabilityInvolves the vulnerability of network assets to unauthorized users of failureUnlikelyRegularly upgradingPrivacyThe technologies and approaches used to safeguard organization’s dataLikelyEncrypt data and use of anti-virusStep 2: Plan of Protection
Based on the needs and requirements of Company XYZ, a plan is required to protect identity; access, authorization and non-repudiation of information transmission, storage and use. Specifically, the effective plan for the organization leadership has to put emphasis on steganography technology. This technology can secure the organization’s assets by concealing network passwords (Sumathi, Santanam & Umamaheswari, 2014). Nonetheless, it is hard to detect stenographic information because authenticated users can gain access of the company’s network resources including emails, information, files and database. As a result, it is important for XYZ network assets can be secured using statistical steganalysis. Steganalysis is the process of detecting secret communication. Concealing messages can level identifiable traces (Sabnis & Awale, 2016). Hence, the concealing procedure changes the statistical attributes that steganalysis tries to identify. The goals of steganalysis is to determine if an image has a secret message or not with a higher degree of unsystematic guessing. Additionally, steganalysis finds details of the image and conceal the embedded algorithm, message length, content or secret key word. In this regards, XYZ can use steganalysis to evaluate how the content is transmitted across its network and sources of all messages. When it comes to identifying hidden messages, the company can monitor traffic so as to detect suspicious activities. Specifically, the transmission of large files/images is suspicious and warrantees further investigation to determine the security of the organization’s information assets. Another strategy that is appropriate for this organization is decryption and encryption. They will help the firm in not only protecting identity but also access, authorization and nonrepudiation of information transmission, storage, and usage. Encryption technology will help XYZ recognize data based on its sources. On the other hand, decryption could help the organization to deal with data leakage issues. Decryption and encryption technologies can also assist the firm to prevent illegal access. Essentially, the efficacy of encryption, decryption and steganography can be achieved through email, network, files and database security. Hence, XYZ should implement security policies that highlight how data should be transmitted or shared across the network. Basically, the company has to spell out which data should be exchanged and which cannot. Additionally, the company has to define user level demonstrating each workers access privileges.
Step 3: Data Hiding Technologies
Encryption Technologies
Shift /Caesar cipher. Shift/Caesar cipher is the oldest and the simplest technique of encryption (Rodriguez-Clark, 2017). The company can use the shift approach to encrypt messages to prevent unauthorized users from access it. In this technique, every letter in the original message/ plaintext is substituted with letter corresponding to a particular number in the alphabet. Every letter in the alphabet takes a position, for instance, 4 represents letter D. Therefore, +4, D would be changed to H, and the same is applicable to other letters in the alphabet. In this manner, a message that was easy to read ends to be hard to read at first glance.
Polyalphabetic cipher. Polyalphabetic cipher is an encryption technique that entails encrypting letters (Rodriguez-Clark, 2017). However, one of the alphabet letters is not encrypted by the matching ciphertext letter. As such, the company will use a combination of varied monoalphabetic ciphers to protect its data from illegal access. This means, various and changing ciphertext in the alphabet would be employed to encrypt plain text.
One Time Pad Cipher/Vernam Cipher/Perfect Cipher. This is a form of encryption technology that uses 0S and 1S in a message. This way, the message content cannot be hacked by authorized users, but it can be decrypted one it reaches the destination. For that reason, the company can use one time pad cipher to protect messages it shares using random keys. Again, once, a key is used it is destroyed.
Block ciphers. In block cipher, plain texts are encrypted to generate ciphertext. The company can use block ciphers to block its data from unauthenticated access. However, similar texts should be encrypted differently to prevent attackers from deciphering the ciphertext. In this scenario, the company should use ciphers to encrypt block that is useful in lowering the possibility of generated same ciphertext and enhnace security of its network resources.
Triple Data Encryption Standard (DES): This technology uses block cipher algorithms that are applied three times on every data block. In Triple DES, the size of the key is increased to secure data. As a result, Triple DES has a stronger cipher compared to single DES (Callas, 2017). Nonetheless, for security of network resources, the company has to employ encryption and decryption. Again, decryption and encryption would enhance backward compatibility.
Rivest, Shamir, and Adelman (RSA). RSA technology protects data by encryption as well as decryption (Sugumar & Imam, 2015). The RSA uses the public key to secure sensitive data especially when not being transmitted over the internet. Specifically, the firms uses a public key for encrypting messages it transmits and use a private key to decrypt. In this manner, the attackers cannot access or read the message because they do not have the private key.
Advanced Encryption Standard (AES). AES is a symmetric cipher and is used to protect classified data. In addition, AES uses a software or hardware to secure confidential information. During encryption, AES utilizes several ciphers including AES-128; AES-192; AND AES-256 (Altigani, Abdelmagid & Barry, 2016). As a result, the organization should use ciphers while an identical secret key is used in decrypting and encrypting sensitive information. Cipher of 128 bits is suitable for protecting classified data up to the secret level while 192 and 256 bits is necessary for sensitive data.
Symmetric Encryption. Symmetrical encryption is a secret key inform of text where a number of random letters are used on the message to change its content (Microsoft, 2018). Symmetrical encryption uses an algorithm and a secret key that makes hard to access the message, especially if the receiver does not have a secret key. In symmetrical encryption, both sender and recipient use an identical key for encrypting and decry...
Get the Whole Paper!
Not exactly what you need?
Do you need a custom essay? Order right now:
Other Topics:
- Project Implementation Of Information Security Management System In Wilmington Pharmaceutica. . .Description: This research is concerned with issues regarding information security management in Wilmington Pharmaceuticals led by the need for implementing effective information security management systems....55 pages/≈15125 words| 53 Sources | APA | IT & Computer Science | Research Paper |
- How Hackers Steal Information And Recommendations Against The MenaceDescription: Identity theft is a crime that involves obtaining information from another person without their knowledge for the purpose of impersonating them and using their details for the imposter's gain...3 pages/≈825 words| 5 Sources | APA | IT & Computer Science | Research Paper |
- Incident Response Digital Forensics Investigating Procedures ResponseDescription: The sample is about incident response team. how incident response teamwork, how to increase their productivity, the current and future trends of incident response teams....5 pages/≈1375 words| 5 Sources | APA | IT & Computer Science | Research Paper |