Loading...

Messages

Proposals

Stuck in your homework and missing deadline? Get urgent help in $10/Page with 24 hours deadline

Get Urgent Writing Help In Your Essays, Assignments, Homeworks, Dissertation, Thesis Or Coursework & Achieve A+ Grades.

Privacy Guaranteed - 100% Plagiarism Free Writing - Free Turnitin Report - Professional And Experienced Writers - 24/7 Online Support

Cryptography

11/08/2020 Client: trav2012 Deadline: 2 Day

  


Scenario


You work for the Apex Trucking Company. This is a firm that moves materials for clients all over North America and Europe. The leadership of the company has no real knowledge of technology, but wants to use encryption to protect the information the company has. The information to be protected consists of future marketing plans for the company, financial data, employee records, customer records, and customer shipping date.


The company wants the capability to securely allow customers to track their orders in real time from their origin to their destination on-line over the Internet. The information that is to be supplied to customers is tracking number, location of shipment, size of shipment, value of shipment, and estimated time of arrival as well as the customer contact information for this shipment.


While this information can be made available from a central server, the marketing groups in Europe, Mexico and Canada need management access to the data to enter new shipments and change orders before they ship.


The company currently is using desktops running Windows XP and Windows based servers. There are only passwords used for security, and a firewall, but no encryption to protect the information.


The project is to provide the above capability securely using encryption, as well as providing additional security to the company via encryption. You will need to address new technology, the reasons and costs behind your choices, and what policy and legal implications there are to your encryption solution


There is at least one marketing group in Mexico, Germany, and Canada, as well as three in the US. The company is based in New York. It is important that customers can rely on the shipping data being accurate, and from the company. 


You’re assigned this crypto architecture project.


Configuration


The current configuration has one server acting as a firewall and web server. This server is directly attached to the Internet. 


There is a database server behind the firewall, as well as a separate server for HR and marketing. The marketing server needs to be securely accessed by the marketing teams. They also need to access the database server through an Internet connection to manage data and display reports.


All databases use MySQL and are currently not secured.


Constraints


Your tasking is crypto architecture. The normal replacement of computers is done on a rotating schedule. It is outside the scope of your project to plan for the replacement of computers. Your architecture should work with the computers you have. You may consider the replacement of equipment if an upgrade or new equipment would be critical to the crypto architecture.


Specific Tasking


You have been specifically tasked to do the following things and develop a complete and sound crypto architecture. Remember, the president is very knowledgeable about cryptography and wants lots of details about how you are going to implement the encryption.



  1. Describe in detail what new cryptographic      systems you are going to propose, how they work, and how they will enhance      security. Be specific about these      systems weaknesses and how you plan to compensate for the weaknesses.

  2. Describe and explain the impact the new      cryptographic security architecture will have on the current security      features and how this impact will be mitigated.

  3. What new issues will arise as a result of      implementing the new cryptographic solutions and what are the arguments on      either side of these issues?

  4. Show a clear and detailed understanding of      the existing encryption being used such as passwords, and operating      encryption features not being used and whether you plan to use these or      not, and if not why not.

  5. How well will all these new cryptographic      features work together?  Identify      any areas of concern, and how you propose to resolve conflicts and issues.

  6. What if any current security features can      be eliminated cost effectively by the new crypto architecture?

Homework is Completed By:

Writer Writer Name Amount Client Comments & Rating
Instant Homework Helper

ONLINE

Instant Homework Helper

$36

She helped me in last minute in a very reasonable price. She is a lifesaver, I got A+ grade in my homework, I will surely hire her again for my next assignments, Thumbs Up!

Order & Get This Solution Within 3 Hours in $25/Page

Custom Original Solution And Get A+ Grades

  • 100% Plagiarism Free
  • Proper APA/MLA/Harvard Referencing
  • Delivery in 3 Hours After Placing Order
  • Free Turnitin Report
  • Unlimited Revisions
  • Privacy Guaranteed

Order & Get This Solution Within 6 Hours in $20/Page

Custom Original Solution And Get A+ Grades

  • 100% Plagiarism Free
  • Proper APA/MLA/Harvard Referencing
  • Delivery in 6 Hours After Placing Order
  • Free Turnitin Report
  • Unlimited Revisions
  • Privacy Guaranteed

Order & Get This Solution Within 12 Hours in $15/Page

Custom Original Solution And Get A+ Grades

  • 100% Plagiarism Free
  • Proper APA/MLA/Harvard Referencing
  • Delivery in 12 Hours After Placing Order
  • Free Turnitin Report
  • Unlimited Revisions
  • Privacy Guaranteed

6 writers have sent their proposals to do this homework:

Top Essay Tutor
Essay Writing Help
Engineering Guru
Writer Writer Name Offer Chat
Top Essay Tutor

ONLINE

Top Essay Tutor

I feel, I would be the best choice for this project, I have more than 10 years of working experience in writing essys, reports, case studies and dissertations. Give me your work and get relax

$150 Chat With Writer
Essay Writing Help

ONLINE

Essay Writing Help

I can provide plagiarism-free work for you within your given deadline. My professional writing career started around 5 years back with a local writing company in my city where I have produced 1000+ documents for my clients.

$155 Chat With Writer
Engineering Guru

ONLINE

Engineering Guru

Hello, I have more than 10 years of writing experience. I can manage essays, summaries, reports and analysis works in very short period of time. I produce plagiarism free content for my clients, will send you FREE TURNITIN Reports as well. Thank you.

$180 Chat With Writer

Let our expert academic writers to help you in achieving a+ grades in your homework, assignment, quiz or exam.

Similar Homework Questions

Leah4sci organic chemistry cheat sheet - How to simplify x squared - Death investigation week1 db - Freezing point depression pre lab answers - New york times private lives submission - 32.3 inches to cm - Microsoft publisher mouse jumping - James burrows accountant launceston - Natan bursztyn - Inverted yield curves are observed when - Economic Assignment - Jerry seinfeld dad season 1 - Alo, soy ana. ¿que tal? - Select the correct statement regarding fixed costs - Pula plantiffs really bad week part 2 - Country manager international marketing simulation - Iso 9001 audit checklist for administration - Organizations that were affected by hurricane katrina - Order winners and order qualifiers ppt - Conflict resolution plan template - 50-CL1 - Homework4 - Porter's five forces paper industry - 5.3 Online Research Discussion - Roller coaster polynomials project answers - Accouting Case - Photosynthesis lab answer key - Discussion - Goals for stevens district hospital part 1 - Discussion question #1 - Wood pole mounting brackets - Why should students be able to use phones in school - Scheme of work definition - Missing slot covers on a computer can cause - Principles of everyday behavior analysis 4th edition pdf - Essay - 5505 san diego edinburg tx 78542 - .27 inches to fraction - Importance of feasibility study to an entrepreneur - St charles gairdner hospital - Mkt 421 five step marketing research approach presentation - Secure efficientforms com little caesars - If good why do i yield to that suggestion - Essay - Central bedfordshire council jobs - Berlin blockade lesson plan - Case study of hrm with answer - Mies van der rohe barcelona pavilion column - Radio commercial script example - Is for honor dead - Datamining Disussion:cluster of objects from a binary transaction data set. - Net neutrality pros and cons essay - JOURNAL ARTICLE REVIEW - EMOTIONAL INTELLIGENCE - Water flows through the pipe contraction shown - Http support ubisoft com - Tax Form - Three switches outside a windowless room - Biology 130 - Mr jingles mouse owner - Water in our world cpalms - Chocolate industry drives rainforest disaster in ivory coast - Find a Resource Collaboration - Leadership in nursing powerpoint presentation - Cillit bang degreaser ingredients - They say i say moves academic writing edition 3rd - A mistake was made but not by me - Peer assessment challenges - Pet speaking part 2 - Phet colorado static electricity - How to calculate azimuth with interior angles - 8 comma rules powerpoint - Claudius for tessie scooter - Jj honeyman & associates - Lse msc international relations - A steel plate has the form of one fourth - The nike shoe investigation worksheet answer key - Order 2301469: Reflection Journal - Speedy delivery systems can buy a piece - Bad physics in movies - Congruence and similarity of triangles - High school teachers vs college professors essay - Exam 1 - complete in 5 hours - Nursing scholarships australian government - Irobot case analysis - 100 positive question - Prograde and retrograde metamorphism - Psychology bonus questions - Nursing Leadership and management DQ # 14 student reply Maydeli Capo - Apa style literature review format - Order # 9601 - Titanic case study ethics - Uber stakeholders - Tank world coffs harbour - Seppelt great western imperial reserve - Global technology's capital structure is as follows - For all work solver - How to write a treatment plan social work - Informatics and nursing opportunities and challenges 4th edition pdf - Six root causes of managerial incompetence and derailment - Secure software development concepts support protecting applications