Academic-Essay Writing Service

No Plagiarism, No ChatGPT

Stage 1: Installing encryption software Before starting this practical Encryption Project, you will need to have Windows Server 2016 and a Windows 10 client installed in virtual machines. You can use a hypervisor product such as W

by

in
Adapted by permission of the copyright holder © 2020 CAQA
Encryption Project 2
Project Scenario : Southern Star
Business this assessment is based on:
Documentation reviewed as preparation: Southern Star – Business and Situation Overview.pdf
Assessment Submission: Submit all documents in CQU Moodle
Documents to be submitted: See the list below …
? Southern Star – Encryption Implementation Strategy
? Southern Star – Encryption Technologies Impact Analysis Report
? Southern Star – Encryption Technologies Performance Report
? Southern Star end user – Encryption feedback form
? Southern Star Helpdesk – Encryption feedback form
ICTNWK537 Implement secure encryption technologies | Encryption Project 2 | Ver 21.1 | Page 2
Encryption Project 2
Stage 1: Installing encryption software
Before starting this practical Encryption Project, you will need to have Windows Server 2016 and a Windows 10 client installed in virtual machines. You can use a hypervisor product such as Windows Hyper-V or Oracle VirtualBox.
You have received approval from David (General Manager) to implement a pilot of the encryption project. You are required to install encryption software and tools in a pilot environment prior to going live. You will be documenting the process to provide documentation for the “Go Live” stage.
? Assume yourself as “Lee” (Head of Security) and install, test and use the following encryption software and tools.
? You need to install encryption software on the Windows Server and Windows 10 client VMs as indicated.
? You will also need to have access to your own personal computer (not in a VM) with Microsoft Outlook installed. ? Document the following 3 tasks in a document titled:
“Southern Star – Encryption Implementation Strategy”. Use the provided Southern Star Report Template.
1.1 Create and Install a self-signed SSL certificate in IIS on your Windows Server (Note: must include step-by-step instructions and screenshots)
1.2 Configure and enable BitLocker on the Windows Server and on the Windows 10 Client. (Note: must include step-by-step instructions and screenshots)
1.3 Configure Microsoft Outlook to use secure protocols for accessing your CQU student email account ?????.?????@cqumail.com.
(Note: must include step-by-step instructions and screenshots)
Stage 2: Analysing the effect of encryption on user roles
2.1 As a part of your responsibilities you need to analyse the expected effects/impacts of the encryption you have just implemented on user roles and responsibilities. Do some research and consider the impacts on the following Users/Roles and areas of responsibility: ? End Users – Email, Intranet access, and access to local drives with Bitlocker encryption.
? Helpdesk – End user support for Bitlocker and for email.
? Administrators – Certificate maintenance, ability to monitor/filter encrypted traffic at the network perimeter.
2.2 Document these effects/impacts in a document titled
“Southern Star – Encryption Technologies Impact Analysis Report”. Use the provided Southern Star Report Template.
Write each of the three sections in language appropriate to the target audience i.e., End Users, Helpdesk & Network Administrators.
The table below summarises the minimum list of impacts to be addressed:
Encryption Technologies Impact Analysis Report
Role Description/effect
End Users ? Email
? Intranet access
? Access to local drives with Bitlocker encryption
Helpdesk ? End user support for Bitlocker
? End user support for Email usage
Administrators ? Certificate maintenance
? Ability to monitor/filter encrypted traffic at the network perimeter
Stage 3: Checking functioning and performance of Encryption software
You should have now implemented the encryption technologies in the previous stage. Now, you are required to monitor the encryption technologies functioning by performing some network monitoring.
3.1 Install an appropriate network monitoring software such as Wireshark on your virtual server to analyse the performance of the encryption technologies.
3.2 Use it to confirm that traffic is in fact being encrypted by checking for SSL/TLS traffic and encrypted data exchanges.
3.3 Check network performance to determine if there is any evidence of encryption bottlenecks impacting network performance.
3.4 Check Event Logs on the Server and Workstation for evidence of encryption related warnings and/or errors.
Compile this information into a document titled:
“Southern Star – Encryption Technologies Performance Report”. Use the provided Southern Star Report Template.
Stage 4: Gathering user feedback after implementation has been completed
Now that the encryption technologies are functioning, there is a need to find out how various stakeholders regard the impacts of these newly implemented technologies.
4.1 Develop a Feedback form that can be used to obtain feedback from end-users about the impacts (positive and negative) that they have observed.
? Remember, most end-users do not understand a lot of technical terms. ? Name the Form “Southern Star end user – Encryption feedback form” ? Use the provided Southern Star Feedback Template.
4.2 Develop a Feedback form that can be used to obtain feedback from Helpdesk personnel about the impacts (positive and negative) that they have observed.
? Ensure the terminology used is appropriate for Helpdesk personnel.
? Name the Form “Southern Star Helpdesk – Encryption feedback form”.
? Use the provided Southern Star Feedback Template.
End of Assessment

Looking for answers ?

Chat with us at get the answers

Recent Questions

Needs to be 3500 words and APA referencing.I was using another company but the assignment came back and the english is too broken to even understand!I would really like if the writer speaks english as…Find a peer-reviewed journal article, on any topic of interest to you, which contains statistics. Specifically, you are looking for an article which contains results from a study or experiment conducted…Assessment 3 InformationSubject Code: ACC304Subject Name: Taxation LawAssessment Title: Case StudiesAssessment Type: Statement of AdviceWeighting: 30 %Total Marks: 40 marksSubmission: Via Turnitin on MyKBSDue…What’s the minimum price you can do for this whole assignmentIt is due this Saturday 22nd Jan and needs to be 3500 words and APA referencing.I was using another company but the assignment came back and the english is too broken to even understand!I would really…The essays should be 2 paragraphed.1.Provide a two-paragraph reading response “Tidewater to Tamba” reading this week. The first paragraph will summarize the reading and the second will provide your reaction…ACCT6004 Finance Session 3, 2021Assessment 3: Business Case Studies 2Due date: 28 January 2022, 11PMThis assignment has a 25% weighting in your overall mark for this unit and focuses on content from Topics…Show All Questions

GET HELP WITH YOUR HOMEWORK PAPERS @ 30% OFF

For faster services, inquiry about  new assignments submission or  follow ups on your assignments please text us/call us on +1 (251) 265-5102

Write My Paper Button

WeCreativez WhatsApp Support
We are here to answer your questions. Ask us anything!
👋 Hi, how can I help?