Home » Downloads » Option #1: Security and Encryption Policies

Option #1: Security and Encryption Policies

Option #1: Security and Encryption Policies

Read the following case study available through ProQuest in the CSU-Global Library:

Yadron, D. (2014, Sep 17). Chinese hacked U.S. military contractors, Senate panel says; hackers broke into computer networks 20 times in a year. Wall Street Journal (Online). Retrieved from http://search.proquest.com.csuglobal.idm.oclc.org/docview/1562486712?accountid=38569

Answer the following questions in your paper:

  1. What strategic recommendations would you make?
  2. What operational security aspects should be considered so as to prevent such attacks in the future?
  3. What sort of an encryption policy, if any, would have helped in this situation?

Your paper should meet the following requirements:

  • Be one to two pages in length, not including the cover page and reference page.
  • Follow the CSU-Global Guide to Writing and APA Requirements. Your paper should include an introduction, a body with fully developed content, and a conclusion.
  • Support your answers with the readings from Module 5 and at least one scholarly journal article. The CSU-Global Library is a great place to find resources.
  • Be clearly and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing. If you need assistance with your writing style, start with Tools for Effective Writing at the CSU-Global Library, accessible from the Library’s homepage.

 

 

 

 

 

 

……………………….Answer Preview…………………………….

Introduction

Cyber attack defined as a type of hostile procedure engaged by people or organizations who aim at computer networks, computer information systems, and personal computer gadgets through a variety of mediums of mischievous actions. They begin from an unknown origin that either ruins, steals, or changes a specific target by hacking into a vulnerable system (Yadron, 2014).  The U.S Senate has accused the Chinese government for hacking into computer systems belonging to their military and airline…..

APA

668 words