Have a network security project report 

Have a network security project report

In this section, students will address each of the following.

Define the public key infrastructure (PKI) requirements, propose a solution, and justify the solution.

Students should be specific when discussing the implementation and configuration required for the PKI solution.

Define the secure protocol implementation requirements, propose a solution, and justify the solution.

Students should consider data as it is in transit and discuss the numerous scenarios and solutions to protect it.

Define the file encryption requirements, propose a solution, and justify the solution.

Students should consider data at rest and discuss the numerous scenarios and solutions to protect it.

Define the file hashing implementation, propose a solution, and justify the solution.

Students should consider where hashing should be implemented in the network design and explain what it provides in each instance.

Define the backup and restoration implementation, propose a solution, and justify the solution.

Students should explain the process, where it is applicable in the UMUC network scenario, and how it will be achieved (process, hardware, and frequency).

Answer preview

Public Key Infrastructure

Requirements

It is essential to set up an infrastructure that will facilitate secure communication on the UMUC network and at the same time allow the users to communicate both within and outside the network.  A Public Key Infrastructure (PKI) is a group of hardware, software, policies, processes and procedures who sole purpose is to aid them in the creation and management of public keys and digital certificates.  It also facilitates the use of various technologies on a given network…

 

(1300 words)

Scroll to Top