+1 (208) 254-6996 [email protected]
  

ISM560 – Task 3

Task:

Don't use plagiarized sources. Get Your Custom Essay on
ISM 560 $ 542 Task 3
Just from $13/Page
Order Essay

Design the cloud infrastructure for Wepayu. Submit the design document that includes the conceptual design and physical design.

Rubrics:

ElementExceeds Competency
Cloud Infrastructure DesignCompleted the design of the cloud infrastructure for Wepayu along with the design document that includes the conceptual design and physical design. All documents are clear, easily accessible and understandable by stakeholders. The physical design follows appropriate design features and all elements consistent with best practices for physical design models in enough detail for programming.Include graphs and images where applicable and cite them as well

Note:

Approx 1000 words (without cover and reference page), Use APA 7th edition format, Use references and citation.

Resource:

You can watch the following videos for more further information.

· Watch Architecting a Cloud Infrastructure: A Practical Design Scenario at http://channel9.msdn.com/Events/TechEd/NorthAmerica/2013/ATC-B203#fbid=

· Watch Designing Network Infrastructures for Hybrid Cloud at http://channel9.msdn.com/Events/TechEd/NorthAmerica/2014/DCIM-B352#fbid=

ISM542 -Task 3

Task:

This module will focus on the basics of cryptography is such as symmetric and asymmetric encryption, algorithms, and hashing, as well as building an understanding of what it takes to move and store data securely.

The task will be to determine encryption that is needed to provide security for the company’s system. This will include plans to address:

· Passive and active network attacks

· Symmetric encryption

· Dissecting block and stream ciphers

· Dissecting the public-key algorithms

· Creating key pairs

· Passwords, hash, salt, and rainbow tables

· Secure Sockets Layer

· Email and IP security

Please follow the Rubrics carefully:

ElementsExceeds Competency90 – 100
MechanicsGrammar, spelling, sentence structure; Cite sources in APA format from reputable reference materials(10%)All work is in APA format with appropriately cited sources; no grammar or spelling errors. Uses complete sentences, well formed paragraphs, and graduate level word usage and complex sentence structure.
Plan for EncryptionPassive and active network attacks(10%)Clearly, and logically analyzes what encryption is needed to provide security for the company’s system. This includes a thorough discussion of passive and active network attacks in relation to encryption. Provides supportive documentation from reliable sources.
Plan for EncryptionSymmetric encryption(10%)Clearly, and logically analyzes what encryption is needed to provide security for the company’s system. This includes a thorough discussion of symmetric encryption. Provides supportive documentation from reliable sources.
Plan for EncryptionDissecting block and stream ciphers(10%)Clearly, and logically analyzes what encryption is needed to provide security for the company’s system. This includes a thorough discussion of dissecting block and stream ciphers. Provides supportive documentation from reliable sources.
Plan for EncryptionDissecting the public-key algorithms(10%)Clearly, and logically analyzes what encryption is needed to provide security for the company’s system. This includes a thorough discussion of dissecting the public-key algorithms. Provides supportive documentation from reliable sources.
Plan for EncryptionCreating key pairs(10%)Clearly, and logically analyzes what encryption is needed to provide security for the company’s system. This includes a thorough discussion of creating key pairs. Provides supportive documentation from reliable sources.
Plan for EncryptionPasswords, hash, salt, and rainbow tables(10%)Clearly, and logically analyzes what encryption is needed to provide security for the company’s system. This includes a thorough discussion of passwords, hash, salt, and rainbow tables. Provides supportive documentation from reliable sources.
Plan for EncryptionSecure Sockets Layer(10%)Clearly, and logically analyzes what encryption is needed to provide security for the company’s system. This includes a thorough discussion of secure sockets layer. Provides supportive documentation from reliable sources.
Plan for EncryptionEmail and IP security(10%)Clearly, and logically analyzes what encryption is needed to provide security for the company’s system. This includes a thorough discussion of Email and IP security. Provides supportive documentation from reliable sources.
Summary(10%)Writes a clear summary with recommendations from the analysis of encryption needs. Provides supportive documentation from reliable sources.

Note:

1. Min 1000 Words without the cover and reference page

2. Use APA 7th edition

3. Include references and citations

Order your essay today and save 10% with the discount code ESSAYHELP