Order this Assignment Now:
£79 3 Design an encryption plan and courses of action for a given organisation
QUALIFI Level 5 Diploma in Cyber Security
Unit code: J/617/4634 RQF
The process of encrypting and decrypting information forms the basis of much computer, device and network security. Cryptography is designed and used to protect the confidentiality, integrity and authenticity of information. From the very beginnings of computing, and throughout the industry’s evolution, the establishment of policies, guidelines and laws has shaped the disciplines of information security and organisational resilience in profound and, often, unintended, ways.
In this unit learners will be introduced to the concept and history of cryptography, and its subdisciplines (including cryptology), and how cyber-enabled networks and devices have their communications security underpinned by cryptographic methods and sector standards. Learners will explore methods of attack, including side-channel, additional encryption methods and escrow principles and key.
Learners will look at how businesses can deploy encryption to enhance their information security approaches.
Learners will develop an understanding of security technical and generic management and leadership teaching. Much of this teaching will be particularly relevant to learners wishing to move into more advanced
technical qualifications, including the CompTIA Security + accreditation and the Cyber Security industry gold standard: Information Security Management . The Certified Information Systems Security Professional (CISSP)
Learning Outcomes and Assessment Criteria
Learning Outcomes. To achieve this unit a learner must be able to:
Assessment Criteria: Assessment of these outcomes demonstrates a learner can:
1 Understand key cryptographic principles and modes
1.1 Define the concept and application of cryptography
1.2 Explain symmetric and asymmetric modes and approaches
1.3 Assess how cryptographic methods and standards underpin the communications security of cyber-enabled networks and devices
2 Understand the standards, regulations and laws that apply to business and government organisations in relation to encryption
2.1 Explain the key principles of the related standards, regulations and laws and why they are in place
2.2 Assess the consequences for organisations and individuals of non-compliance with these standards, regulations and laws
3 Design an encryption plan and courses of action for a given organisation
3.1 Explain the methods of attack used to target encrypted data
3.2 Assess the additional encryption methods available
3.3 Explain the key principles of escrow and recovery
3.4 Explain the importance of having robust encryption arrangements within IT systems
3.5 Evaluate the existing encryption arrangements
3.6 Design an encryption plan to meet the needs of a given organisation, with recommended courses of actions
-The science of crypto
-Symmetric and asymmetric
-Methods of attack
-Standards, regulations, legal domains
-Key escrow and recovery
Each unit will be worth
30 credits and the qualification is designed to be flexible for learners who are already working and in demanding jobs. Every unit must be passed in order to achieve the Diploma.
Learners will be able to progress sequentially through each unit, accumulating credits as they pass each module assessment point.
During each of the four 30-credit units, every learner will have the opportunity to ‘practise’ and hone their ability to undertake the final (formal) assessment. Such non-mandatory practice will by way of completing a formative exercise/s throughout the unit.
Summative Assignment: CONSULTANCY REPORT - Write a company or business report reviewing a) existing encryption arrangements within the IT system, and b) offering a Courses of Action group of recommendations for the company’s CISO
The standard price quoted for this assignment is up to . For custom word count and written work, contact via 3000 words Click here → , OR Whatsapp UK OR Whatsapp Middle East ← Click here . Live Chat