0 Comments

Description

AAA Framework and Cryptography Strategy

For this assignment, you will complete a data security strategy. This is done by gathering facts about the selected organization and identifying project needs. For this assignment, use the suggested resources, the Capella library, and the Internet to research the subject matter.

Instructions

For this assignment, complete the following components for your Perimeter Security Strategy:

  • Describe vulnerabilities and threats associated with data being stored, in transit and in use.
  • Compare two cryptography tools and strategies for the project that would be beneficial for protecting data being stored, in transit and in use.
  • Describe at least three (3), non-cryptography strategies for protecting stored data, data in transit and/or data in use for the company.
  • Describe strategies and identify at least two (2) tools for supporting the AAA framework in your company’s security solution.
  • Determine how you would consider applying access control and identify management to protect stored data, data in transit and/or data in use in the company.
  • Define at least two (2) policies or guidelines that you would include your organization’s data security manual. You are encouraged to provide resources and citations. Any references should be formatted according to APA (6th Edition) Style and Formatting.

Note: Make sure that you follow the scoring guide prior to submitting. Submit your document to the assignment area once completed.

AAA Framework and Cryptography Strategy Scoring Guide
Due Date: End of Unit 2.
Percentage of Course Grade: 10%.
AAA Framework and Cryptography Strategy Scoring Guide Grading Rubric
Criteria
Nonperformance
Basic
Proficient
Distinguished
Describe vulnerabilities and threats associated with data being stored, in
transit, and in use.
17%
Analyzes
vulnerabilities
and threats
Does not
Identifies
Describes
associated
identify
vulnerabilities vulnerabilities with data
vulnerabilities
and threats
and threats
being stored,
and threats
associated
associated
in transit, and
associated
with data
with data
in use;
with data
being stored, being stored, provides
being stored,
in transit, and in transit, and detailed
in transit, and
in use.
in use.
information
in use.
and depth on
the threats of
concern.
Compare cryptography tools and strategies that would be beneficial for
protecting data being stored, in transit, and in use.
17%
Does not
describe
cryptography
tools and
strategies that
would be
beneficial for
protecting
data being
stored, in
transit, and in
use.
Evaluates
Describes
Compares
cryptography
cryptography cryptography tools and
tools and
tools and
strategies that
strategies that strategies that would be
would be
would be
beneficial for
beneficial for beneficial for protecting
protecting
protecting
data being
data being
data being
stored, in
stored, in
stored, in
transit, and in
transit, and in transit, and in use;
use.
use.
evaluation
provides
AAA Framework and Cryptography Strategy Scoring Guide Grading Rubric
Criteria
Nonperformance
Basic
Proficient
Distinguished
insight on
how the tools
will aid in the
protection of
data.
Describe at least three (3) non-cryptography strategies for protecting stored
data, data in transit, and/or data in use for the company.
17%
Analyzes at
least three (3)
nonDoes not
Identifies at
Describes at cryptography
identify any
least three (3) least three (3) strategies for
nonnonnonprotecting
cryptography cryptography cryptography stored data,
strategies for strategies for strategies for data in transit,
protecting
protecting
protecting
and/or data in
stored data,
stored data,
stored data,
use for the
data in transit, data in transit, data in transit, company;
and/or data in and/or data in and/or data in provides
use for the
use for the
use for the
details on how
company.
company.
company.
the strategies
will aid in the
protection of
data.
Describe strategies and identify at least two (2) tools for supporting the AAA
framework in the company’s security solution.
17%
Does not
identify
strategies and
identify at
least two (2)
tools for
supporting
the AAA
framework in
the company’s
Identifies
strategies and
identify at
least two (2)
tools for
supporting
the AAA
framework in
the company’s
security
solution.
Describe
strategies and
identify at
least two (2)
tools for
supporting
the AAA
framework in
the company’s
security
solution.
Analyzes
strategies and
describes at
least two (2)
tools for
supporting the
AAA
framework in
the company’s
security
solution;
AAA Framework and Cryptography Strategy Scoring Guide Grading Rubric
Criteria
Nonperformance
Basic
Proficient
security
solution.
Distinguished
provides
details on the
tools for
supporting
AAA
framework in
the company’s
security
solution.
Determine access control application and identify management to protect
stored data, data in transit, and/or data in use in the company.
17%
Does not
describe
access control
application
nor identify
management
to protect
stored data,
data in transit,
and/or data in
use in the
company.
Describes
access control
application
and identifies
management
to protect
stored data,
data in transit,
and/or data in
use in the
company.
Determines
access control
application
and identifies
management
to protect
stored data,
data in transit,
and/or data in
use in the
company.
Define at least two (2) policies or guidelines that you would include in the
organization’s data security manual.
15%
Does not
define any
policies or
guidelines
that would be
included in
the
organization’s
data security
manual.
Defines only
one or partial
policies or
guidelines
that would be
included in
the
organization’s
data security
manual.
Explains at
least two (2)
Defines at
policies or
least two (2)
guidelines
policies or
that would be
guidelines
included in
that would be
the
included the
organization’s
organization’s
data security
data security
manual;
manual.
provides
details and
Analyzes
access control
application
and identifies
management
to protect
stored data,
data in transit,
and/or data in
use in the
company.
AAA Framework and Cryptography Strategy Scoring Guide Grading Rubric
Criteria
Nonperformance
Basic
Proficient
Distinguished
examples on
how the
defined
policies or
guidelines
strengthen the
overall
security
solution.

Purchase answer to see full
attachment

Order Solution Now

Categories: