Security and Encryption Policies

Security and Encryption Policies

CASE: http://www.bbc.com/news/technology-29250959

Read the following case study available through ProQuest in the CSU-Global Library:

Yadron, D. (2014, Sep 17). Chinese hacked U.S. military contractors, Senate panel says; hackers broke into computer networks 20 times in a year. Wall Street Journal (Online). Retrieved from http://search.proquest.com.csuglobal.idm.oclc.org/docview/1562486712?accountid=38569

Answer the following questions in your paper:

  1. What strategic recommendations would you make?
  2. What operational security aspects should be considered so as to prevent such attacks in the future?
  3. What sort of an encryption policy, if any, would have helped in this situation?

Your paper should meet the following requirements:

  • Be one to two pages in length, not including the cover page and reference page.
  • Follow the CSU-Global Guide to Writing and APA Requirements. Your paper should include an introduction, a body with fully developed content, and a conclusion.
  • Support your answers with the readings from Module 5 and at least one scholarly journal article. The CSU-Global Libraryis a great place to find resources.
  • Be clearly and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing. If you need assistance with your writing style, start with Tools for Effective Writing at the CSU-Global Library, accessible from the Library’s homepage.
Answer Preview
Cyber attack defined as a type of hostile procedure engaged by people or organizations who aim at computer networks, computer information systems, and personal computer gadgets through a variety of mediums of mischievous actions…
(662 Words)
Scroll to Top