Home » Downloads » Securing Data at Rest and in Transit

Securing Data at Rest and in Transit

Securing Data at Rest and in Transit

Securing Data at Rest and in Transit

In this section, students will address each of the following.
Define the public key infrastructure (PKI) requirements, propose a solution, and justify
the solution.
Students should be specific when discussing the implementation and
configuration required for the PKI solution.
Define the secure protocol implementation requirements, propose a solution, and
justify the solution.
Students should consider data as it is in transit and discuss the numerous
scenarios and solutions to protect it.
Define the file encryption requirements, propose a solution, and justify the solution.
Students should consider data at rest and discuss the numerous scenarios and
solutions to protect it.
Define the file hashing implementation, propose a solution, and justify the solution.
Students should consider where hashing should be implemented in the network
design and explain what it provides in each instance.
Define the backup and restoration implementation, propose a solution, and justify the
solution.
Students should explain the process, where it is applicable in the UMUC network
scenario, and how it will be achieved (process, hardware, and frequency).

Use this template as a guide while creating your Network Security Proposal (Parts 1-
3).
Include at least two scholarly references in each of the three submissions. Thus, a
total of six scholarly references will be included in total. Students may find scholarly
sources by visiting UMUC’s library and online sources. Students will also include
other credible sources as appropriate.
Use IEEE-style citations. We do not use APA or MLA-style citations. Students should
contact UMUC’s Effective Writing Center for assistance.
Use proper terminology and expand acronyms in each paragraph they are used. For
example, the first time in a paragraph an acronym is used it should be expanded (e.g.,
University of Maryland University College (UMUC). Thereafter, and as long as you are
in the same paragraph, the acronym (e.g., UMUC) can be used. When starting a new
paragraph, the rule begins anew.
The use of figures and diagrams is encouraged. Students will properly cite the figures
and diagrams according to the IEEE-style citation.

Network Security Proposal Template (1)

Project Instructions – Network Security

Rubric

Answer preview to Securing Data at Rest and in Transit

Securing Data at Rest and in Transit

APA

1676 words

Get instant access to the full solution from yourhomeworksolutions by clicking the purchase button below

Accounting

Applied Sciences

Article Writing

Astronomy

Biology

Business

Calculus

Chemistry

Communications

Computer Science

Counselling

Criminology

Economics

Education

Engineering

English

Environmental

Ethics

Film

Food and Nutrition

Geography

Healthcare

History and Government

Human Resource Managment

Information Systems

Law

Literature

Management

Marketing

Mathematics

Nursing

Philospphy

Physics

Political Science

Psychology

Religion

Sociology

Statistics

Writing

Terms of service

Contact