In this assignment, you will create an Encryption Policy for CIO review. Use the organization you chose. THE ORGANIZATION IS CAPITAL ONE. inthe discussion Classifying an Organization’s Sensitive Data.
In this assignment, you accomplish form an Encryption Policy for CIO critique. Use the form you chose. THE ORGANIZATION IS CAPITAL ONE. inthe discourse Classifying an Organization's Impressible Data.
Write a 2- to 2½-page policy, and secure you:
- - List the form’s impressible grounds that must be armed.
- - Complete a matrix that compares the asymmetric and symmetric encryption methodologies (PKI, TLS, SSL) for enriching grounds among the network.
- - Describe at smallest 2 earliest threats that could settle the form’s grounds.
- - Describe how the encryption methodologies thats hould be implemented to secure the form’s impressible grounds.
Format your citations according to APA guidelines.