Project Phases & Tasks Phase 1: Understanding and Defining Requirements Task: Each group will select a hypothetical organization type (e.g., healthcare, finance, or retail) and analyze its unique security needs. Deliverable:
Project Title: Designing a Secure Communication Framework for an Enterprise
Objective
Students will work in small groups to design a secure communication framework for a hypothetical organization. They’ll explore structures, transmission methods, security measures, and best practices to create a solution that aligns with confidentiality, integrity, and availability (CIA) principles.
Project Phases & Tasks
Phase 1: Understanding and Defining Requirements
- Task: Each group will select a hypothetical organization type (e.g., healthcare, finance, or retail) and analyze its unique security needs.
- Deliverable: A brief outline that defines the organization’s communication needs, such as secure file transfer, encrypted messaging, or remote access, and the importance of CIA principles for each type.
- Learning Outcome Mapping: 1, 2
Phase 2: Analyzing Transmission Methods and Security Measures
- Task: Groups will research various transmission methods (e.g., VPN, TLS, IPsec) and security protocols suitable for their organization’s communication framework.
- Deliverable: A report summarizing recommended transmission methods and security protocols, explaining how each method supports confidentiality, integrity, and availability.
- Learning Outcome Mapping: 1, 5
Phase 3: Establishing Controls within Business Applications
- Task: Using the organization's needs and chosen transmission methods, groups will outline at least three security controls for business applications (e.g., access control, data encryption, intrusion detection).
- Deliverable: A control plan listing each control, the security strategy it supports, and how it aligns with the organization’s security goals.
- Learning Outcome Mapping: 3
Phase 4: Designing a Cryptographic Strategy for Data Protection
- Task: Groups will identify cryptographic measures to secure sensitive information within the organization’s communication framework (e.g., data encryption standards, hashing for integrity, digital certificates).
- Deliverable: A cryptographic strategy outlining selected methods, rationale, and how these methods protect data confidentiality and integrity.
- Learning Outcome Mapping: 5
Phase 5: Evaluating Procedures and Standards
- Task: Groups will evaluate high-level procedures and standards relevant to their communication framework (e.g., compliance standards, disaster recovery plans, regular security audits).
- Deliverable: A summary evaluating the impact of each procedure or standard on the overall security strategy, and how they support or enhance the framework.
- Learning Outcome Mapping: 4
Final Deliverables
- Group Report: A document compiling all sections from each phase, forming a cohesive security plan for the organization’s communication framework. Final product should be 24 pages in length. APA formatting is REQUIRED.
- Presentation: A 10 PowerPoint slide presentation where each group explains their framework design and decision-making process.