Computer Science Question

Description

Description

Don't use plagiarized sources. Get Your Custom Assignment on
Computer Science Question
From as Little as $13/Page

Network administrators often are required to make technology recommendations to their organization’s leadership team. These recommendations should be based on the evaluation of current technologies, principles, and theories.

As the manager of network operations, you have been asked by your leadership team to prepare a decision paper on your recommendation for encryption tools to be used on your network. You are to include cryptographic methods for securing data at rest, data in motion, and data in use. Explain how each method works and your recommendation for the appropriate key strength. In a Microsoft Word document of 3 pages in length discuss the following.

Cover page with name, course information, unit number and date (does not count towards the 3-page requirement)
Page 1- Listing of storage devices used on the network and recommendations of cryptographic products, algorithms, and key strength for data at rest.
Page 2- Recommendations of cryptographic products, algorithms, and key strength for data in motion (being sent across the organization’s network). Recommendations should include data traveling on the local area network, data moving across frame relay circuits, data moving across the Internet, and virtual private network (VPN) tunnels
Page 3- An explanation of the risk for data that is processing in RAM and recommendations of cryptographic products, algorithms, and key strength for data in use.
References in APA format (does not count towards the 3-page requirement)

Cover page and reference page are not included in page count. Document formatting, citations, and references must follow APA format. The AIU APA Guide includes sections for paper formatting, as well as reference and citation examples. For example, 250 words equals one page of content.