Solved by verified expert:Write 4–6 pages that describe the encryption-related functions available to the business in the case study that support the security and efficiency of its new network.Describe the different forms of encryption most commonly applied in specific situations, including: Access controls, flow control, cryptography, firewalls, intrusion detection systems, et cetera.Applications of cryptography (National Centers of Academic Excellence in Information Assurance/Cyber Defense, 2013).Hashing and encryption.Cryptography.For integrity.Certificates.Public key infrastructure.Symmetric cryptography (DES, Twofish).Describe the information flow between databases and servers, and applicationsDescribe the role that encryption plays in securing these information flows.Analyze hashing and encryption properties and applications, including: Classical cryptanalysis (a la Konheim).Hashing and signatures.Collision resistance.Cryptography.Hashing and encryption.Explain how encryption can contribute to mitigating risks due to inference and aggregation.Discuss the history of encryption from DES through AES.Differentiate between symmetric and asymmetric encryption methodologies.Describe commonly used examples of symmetric encryption.Describe commonly used examples of asymmetric encryption.Additional RequirementsWritten communication: Written communication is free of errors that detract from the overall message.APA formatting: Use current APA style and formatting guidelines.Length: 4–6 pages, excluding the references page.Font and font size: Times New Roman, 12 point.ReferenceNational Centers of Academic Excellence in Information Assurance/Cyber Defense (IA/CD). (2013). CAE knowledge units. Retrieved from http://www.cisse.info/pdf/2014/2014%20CAE%20Knowle…Criteria Non-performance Basic Proficient Distinguished Describe different forms of encryption. Does not describe different forms of encryption. Describes, incompletely or inaccurately, different forms of encryption. Describes different forms of encryption. Describes different forms of encryption, including the use of supporting examples Describe the information flow between databases/servers and applications. Does not describe the information flow between databases/servers and applications. Describes incompletely or inaccurately the information flow between databases/servers and applications. Describes the information flow between databases/servers and applications. Describes the information flow between databases/servers and applications, including the use of supporting examples. Describe the role that encryption plays in security information flows. Does not describe the role that encryption plays in security information flows. Describes incompletely or inaccurately the role that encryption plays in security information flows. Describes the role that encryption plays in security information flows. Describes the role that encryption plays in security information flows, including the use of supporting examples. Analyze hashing and encryption properties and applications. Does not analyze hashing and encryption properties and applications. Analyzes incompletely or inaccurately hashing and encryption properties and applications. Analyzes hashing and encryption properties and applications. Analyzes hashing and encryption properties and applications, including the use of supporting examples. Explain how encryption can contribute to mitigating risks due to inference and aggregation. Does not explain how encryption can contribute to mitigating risks due to inference and aggregation. Explains incompletely or inaccurately how encryption can contribute to mitigating risks due to inference and aggregation. Explains how encryption can contribute to mitigating risks due to inference and aggregation. Explains how encryption can contribute to mitigating risks due to inference and aggregation, including the use of supporting examples. Discuss the history of encryption from DES through AES. Does not discuss the history of encryption from DES through AES. Discusses incompletely or inaccurately the history of encryption from DES through AES. Discusses the history of encryption from DES through AES. Discusses the history of encryption from DES through AES, including the use of supporting examples. Differentiate between symmetric and asymmetric encryption methodologies. Does not differentiate between symmetric and asymmetric encryption methodologies. Differentiates incompletely or inaccurately between symmetric and asymmetric encryption methodologies. Differentiates between symmetric and asymmetric encryption methodologies. Differentiates between symmetric and asymmetric encryption methodologies, including the use of supporting examples. Describe commonly used examples of symmetric encryption. Does not describe commonly used examples of symmetric encryption. Describes, incompletely or inaccurately, commonly used examples of symmetric encryption. Describes commonly used examples of symmetric encryption. Describes commonly used examples of symmetric encryption, including the use of supporting examples. Describe commonly used examples of asymmetric encryption. Does not describe commonly used examples of asymmetric encryption. Describes, incompletely or inaccurately, commonly used examples of asymmetric encryption. Describes commonly used examples of asymmetric encryption. Describes commonly used examples of asymmetric encryption, including the use of supporting examples.
jack_s_wine_and_coffee_shop___a_start_up_case_study.docx

Unformatted Attachment Preview

Jack’s Wine and Coffee Shop – A Start-Up
Case Study
Jack Tower has had a dream for years to begin a coffee and wine shop that he can run in his
neighborhood in his retirement. He has finally achieved the financial goals necessary to embark
on the adventure and has leased the space. He has set about hiring experts to help him get his
business up and running, and you are his choice for providing him the guidance he needs to set
up an efficient and secure data and communications network. His ultimate goal is to run a small
shop with no plans for growth or expansion.
Your first task is to establish the necessary technological components that Jack will need to
purchase in order to make the network successful. You will also identify design considerations
related to virtual, cloud, wireless, point of sale, or other solutions, as well as consideration of
building a traditional wired network.
The second facet of this project is to hone in on the applications and database software that are
appropriate for use in Jack’s shop. Among the most important items to consider are the security
controls that are available and are easily administered.
The third facet of this project is to research network operating system threats and vulnerabilities
as preparation for selecting the most appropriate NOS software to use in support of Jack’s new
business.
The fourth component of this project is to review the means by which the application and
database software vulnerabilities that you have identified can be mitigated in order to ensure that
there are no unknown features that would hinder the proper selection of technologies.
The fifth component of this project is to review the means by which the network operating
system threats and vulnerabilities faced by this project can be mitigated in order to ensure that
there are no unknown features that would hinder the proper selection of technologies.
The sixth component of this project is to explore the role of encryption in the development of
Jack’s network by gathering foundational information that highlights the way this tool can be
integrated into various aspects of the technologies.

Purchase answer to see full
attachment