Nt 2580 Unit 7 Assignment 1

Unformatted text preview: NT2580 Unit 7 Assignment 2 06 Feb. 2014 Design an Encryption Strategy Richman Investments is in need of a new enterprise encryption strategy due to its desire to expand its business operations in both the U.S and in foreign countries. Richman Investment plan involves expanding to 10,000 employees in 20 countries and therefore is a need for a more secure network. This report will discuss some aspects public key infrastructure (PKI), which is one way to protect Richman Investments data. Since Richman Investments stakeholders and assets are a high priority, one security option that should be used is the Privacy option on all levels from workstations to domains, for confidentiality purposes. This will help keep confidential information such as SSN (social security numbers), personal addresses, and phone numbers, or other personal information from anyone other than the authorized user. Encryption is useless if an attacker can access confidential data directly and skip the burden of having to defeat any cryptography. So, if an attacker can access confidential data directly and skip the burden of having to defeat any cryptography....
View Full Document

NT2580 Unit 7 Assignment 2 Design an Encryption Strategy Richman Investments is in need of a new enterprise encryption strategy due to its desire to expand its business operations in both the U.S and in foreign countries. Richman Investment plan involves expanding to 10,000 employees in 20 countries and therefore is a need for a more secure network. This report will discuss some aspects public key infrastructure (PKI), which is one way to protect Richman Investments data. Since Richman Investments stakeholders and assets are a high priority, one security option that should be used is the Privacy option on all levels from workstations to domains, for confidentiality purposes. This will help keep confidential information such as SSN (social security numbers), personal addresses, and phone numbers, or other personal information from anyone other than the authorized user. Encryption is useless if an attacker can access confidential data directly and skip the burden of having to defeat any cryptography. So, a successful strategy defines strong access-control

One thought on “Nt 2580 Unit 7 Assignment 1

Leave a Reply

Your email address will not be published. Required fields are marked *