2.2 Assess the consequences for organisations and individuals of non-compliance with these standards, regulations and laws

Unit DSC01: Cryptography

QUALIFI Level 5 Diploma in Cyber Security

Unit code: J/617/4634 RQF

level: 5

Aim

The process of encrypting and decrypting information forms the basis of much computer, device and network security. Cryptography is designed and used to protect the confidentiality, integrity and authenticity of information. From the very beginnings of computing, and throughout the industry’s evolution, the establishment of policies, guidelines and laws has shaped the disciplines of information security and organisational resilience in profound and, often, unintended, ways.

In this unit learners will be introduced to the concept and history of cryptography, and its subdisciplines (including cryptology), and how cyber-enabled networks and devices have their communications security underpinned by cryptographic methods and sector standards. Learners will explore methods of attack, including side-channel, additional encryption methods and escrow principles and key.

Learners will look at how businesses can deploy encryption to enhance their information security approaches.

Learners will develop an understanding of security technical and generic management and leadership teaching. Much of this teaching will be particularly relevant to learners wishing to move into more advanced Information Security Management technical qualifications, including the CompTIA Security + accreditation and the Cyber Security industry gold standard: The Certified Information Systems Security Professional (CISSP).

Learning Outcomes and Assessment Criteria

Learning Outcomes. To achieve this unit a learner must be able to:

Assessment Criteria: Assessment of these outcomes demonstrates a learner can:

1 Understand key cryptographic principles and modes

1.1 Define the concept and application of cryptography

1.2 Explain symmetric and asymmetric modes and approaches

1.3 Assess how cryptographic methods and standards underpin the communications security of cyber-enabled networks and devices

2 Understand the standards, regulations and laws that apply to business and government organisations in relation to encryption

2.1 Explain the key principles of the related standards, regulations and laws and why they are in place

2.2 Assess the consequences for organisations and individuals of non-compliance with these standards, regulations and laws

3 Design an encryption plan and courses of action for a given organisation

3.1 Explain the methods of attack used to target encrypted data

3.2 Assess the additional encryption methods available

3.3 Explain the key principles of escrow and recovery

3.4 Explain the importance of having robust encryption arrangements within IT systems

3.5 Evaluate the existing encryption arrangements

3.6 Design an encryption plan to meet the needs of a given organisation, with recommended courses of actions

Indicative Content

-The science of crypto

-Cipher types

-Symmetric and asymmetric

-Methods of attack

-Standards, regulations, legal domains

-Key escrow and recovery

Assessment Guidance

Each unit will be worth 30 credits and the qualification is designed to be flexible for learners who are already working and in demanding jobs. Every unit must be passed in order to achieve the Diploma.

Learners will be able to progress sequentially through each unit, accumulating credits as they pass each module assessment point.

During each of the four 30-credit units, every learner will have the opportunity to ‘practise’ and hone their ability to undertake the final (formal) assessment. Such non-mandatory practice will by way of completing a formative exercise/s throughout the unit.

Summative Assignment: CONSULTANCY REPORT - Write a company or business report reviewing a) existing encryption arrangements within the IT system, and b) offering a Courses of Action group of recommendations for the company’s CISO (3000 words).


The standard price quoted for this assignment is up to 3000 words. For custom word count and written work, contact via Click here → Whatsapp UK, OR Whatsapp Middle East  ← Click here OR Live Chat.



                             

Email: [email protected]

100% Plagiarism Free & Custom Written, Tailored to your instructions

Our Giveaways

Plagiarism Report

for د.إ50 Free

Formatting

for د.إ32 Free

Title page

for د.إ20 Free

Bibliography

for د.إ36 Free

Outline

for د.إ19 Free

Limitless Amendments

for د.إ38 Free

Get all these features for
د.إ195.00 FREE

ORDER NOW
assignment bank giveaways

Our Ratings