International Security Report on Secure Email System
VerifiedAdded on  2023/06/04
|7
|1154
|495
AI Summary
This report evaluates the security of a secure email system and examines ethical problems, security assessment, quality of security plan, and security measures. The report suggests that the Brazilian Government can imply advance technology for improving their security system in the network using advance firewall, IDS/IPS, and encryption methods.
Contribute Materials
Your contribution can guide someone’s learning journey. Share your
documents today.
![Document Page](https://desklib.com/media/document/docfile/pages/international-security-report-email/2024/09/08/b4fbf1b5-7bbf-427e-9c32-e299cddd2e39-page-1.webp)
Running head: INTERNATIONAL SECURITY REPORT
International Security Report
Name of the Student:
Student ID:
Name of the University:
Author’s note:
International Security Report
Name of the Student:
Student ID:
Name of the University:
Author’s note:
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
![Document Page](https://desklib.com/media/document/docfile/pages/international-security-report-email/2024/09/08/d3c3517e-471f-485b-8f34-ce7c274c2ad6-page-2.webp)
1INTERNATIONAL SECURITY REPORT
Table of Contents
Introduction......................................................................................................................................2
Examination of Ethical Problem......................................................................................................2
Security Assessment........................................................................................................................2
Evaluation of Quality of Security Plan............................................................................................3
Determination of Security Measures...............................................................................................4
Conclusion.......................................................................................................................................4
References........................................................................................................................................5
Table of Contents
Introduction......................................................................................................................................2
Examination of Ethical Problem......................................................................................................2
Security Assessment........................................................................................................................2
Evaluation of Quality of Security Plan............................................................................................3
Determination of Security Measures...............................................................................................4
Conclusion.......................................................................................................................................4
References........................................................................................................................................5
![Document Page](https://desklib.com/media/document/docfile/pages/international-security-report-email/2024/09/08/8c9be09d-6a1d-433c-aedc-122df2ee46a5-page-3.webp)
2INTERNATIONAL SECURITY REPORT
Introduction
The security of the data is a major factor affecting the development of operations and
activities in contemporary world (Kang & Adibi, 2015). All the activities and processes are built
on the ground of the information management and use of proper information development. The
data security would be helpful for determining the implication and development of successful
privacy measures for integrating the formation of the successful project alignment. The
following assignment had been developed for developing an understanding of the prospect of
security implication for the rest of the development methodologies. The secure email system
would be evaluated in this report.
Examination of Ethical Problem
The secure email system would be developed for integrating the importance of the factors
for development and management of the information (Sari & Karay, 2015). The email system
would comprise of many user data and information of South American people that can be
misused by the US social media platform for commercial use. The information and data can be
misused by the various organizations for deliberate information issues.
The implication would be supported by the significant management of the successful
performance management. The laying of underwater optical fibre network would allow the users
for defining the significant management of the factorial development of activities (Zou, Zhu,
Wang & Hanzo, 2016). The federal government had been facing privacy issues with their
existing system and facility. There had been lax in security of the wireless information transfer
process.
Security Assessment
Introduction
The security of the data is a major factor affecting the development of operations and
activities in contemporary world (Kang & Adibi, 2015). All the activities and processes are built
on the ground of the information management and use of proper information development. The
data security would be helpful for determining the implication and development of successful
privacy measures for integrating the formation of the successful project alignment. The
following assignment had been developed for developing an understanding of the prospect of
security implication for the rest of the development methodologies. The secure email system
would be evaluated in this report.
Examination of Ethical Problem
The secure email system would be developed for integrating the importance of the factors
for development and management of the information (Sari & Karay, 2015). The email system
would comprise of many user data and information of South American people that can be
misused by the US social media platform for commercial use. The information and data can be
misused by the various organizations for deliberate information issues.
The implication would be supported by the significant management of the successful
performance management. The laying of underwater optical fibre network would allow the users
for defining the significant management of the factorial development of activities (Zou, Zhu,
Wang & Hanzo, 2016). The federal government had been facing privacy issues with their
existing system and facility. There had been lax in security of the wireless information transfer
process.
Security Assessment
![Document Page](https://desklib.com/media/document/docfile/pages/international-security-report-email/2024/09/08/943e7646-8aa2-49ef-8f9a-a8df071e4d18-page-4.webp)
3INTERNATIONAL SECURITY REPORT
NSA has been infiltrating the servers of the Brazilian citizens and government records
making it hard for the government to secure their information and data. According to Sarkar,
Basavaraju and Puttamadappa, (2016), the possible factors for the development of the issues
include poorer structure of the security system, advance infiltration technology, and lack of
preventive measures.
Poorer Structure of Security System: Brazil has been facing the issues of poorer
structure of security system in compare to the NSA technology. Hence, it allows the NSA to
extract the information from the Brazilian server.
Advance Infiltration Methods: NSA has been following more advance technology from
the Brazilian government making it impossible for the Brazilian Government to secure their
information.
Lack of Preventive Measures: The prevention measures in the server of Brazilian
Network are very few and of lesser power than the hacking system of the NSA resulting in
unable to prevent the attacks.
The Brazilian Government can imply advance technology for improving their security
system in the network using advance firewall, IDS/IPS, and encryption methods.
Evaluation of Quality of Security Plan
The new security plan of Brazilian Government for transferring their information using
underwater fibre optics is a major factor for aligning the significance of information listing. The
fibre optics would prevent the access of the NSA for infiltrating the data as they would not be
able to access the information without physical interaction with the server. It would decrease the
possibility of wireless infiltration.
NSA has been infiltrating the servers of the Brazilian citizens and government records
making it hard for the government to secure their information and data. According to Sarkar,
Basavaraju and Puttamadappa, (2016), the possible factors for the development of the issues
include poorer structure of the security system, advance infiltration technology, and lack of
preventive measures.
Poorer Structure of Security System: Brazil has been facing the issues of poorer
structure of security system in compare to the NSA technology. Hence, it allows the NSA to
extract the information from the Brazilian server.
Advance Infiltration Methods: NSA has been following more advance technology from
the Brazilian government making it impossible for the Brazilian Government to secure their
information.
Lack of Preventive Measures: The prevention measures in the server of Brazilian
Network are very few and of lesser power than the hacking system of the NSA resulting in
unable to prevent the attacks.
The Brazilian Government can imply advance technology for improving their security
system in the network using advance firewall, IDS/IPS, and encryption methods.
Evaluation of Quality of Security Plan
The new security plan of Brazilian Government for transferring their information using
underwater fibre optics is a major factor for aligning the significance of information listing. The
fibre optics would prevent the access of the NSA for infiltrating the data as they would not be
able to access the information without physical interaction with the server. It would decrease the
possibility of wireless infiltration.
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
![Document Page](https://desklib.com/media/document/docfile/pages/international-security-report-email/2024/09/08/ee569448-9719-4adf-93b1-b47d564f6fdd-page-5.webp)
4INTERNATIONAL SECURITY REPORT
Apart from the underwater optical fibre wires, the Brazilian network can be connected to
the European network by reducing the possibility of cyber-criminal activities with the help of the
following two methods of wireless security protocols and encryption. The protocols would be
implied with the alignment of the successful development model. The management would be
effective for independent implication of the activities. The information would be encrypted for
developing the management of the improved information management.
Determination of Security Measures
Wireless Security Protocol: The implication of the wireless security networks and the
definition of the improved analysis models. The implication would allow the management of the
successive development of the factors and implying the utilization for the analysis and
improvement management (Pathan, 2016). The protocols would be implied with the alignment of
the successful development model. The management would be effective for independent
implication of the activities.
Encryption Process: The encryption process is helpful for taking care of the factors and
developing the successful management of activities taking care of the innovation technology
(Loo, Mauri & Ortiz, 2016). The information management would allow the significant
implication of the factors for development. The information would be encrypted for developing
the management of the improved information management.
Conclusion
It can be concluded from the report that the process of encryption is favourable for the
development of effective alignment of the activities and managing the development of the
successful information management. The security had been improved with the utilization of the
new underwater fibre optics for security of the information. The implication of the effective
Apart from the underwater optical fibre wires, the Brazilian network can be connected to
the European network by reducing the possibility of cyber-criminal activities with the help of the
following two methods of wireless security protocols and encryption. The protocols would be
implied with the alignment of the successful development model. The management would be
effective for independent implication of the activities. The information would be encrypted for
developing the management of the improved information management.
Determination of Security Measures
Wireless Security Protocol: The implication of the wireless security networks and the
definition of the improved analysis models. The implication would allow the management of the
successive development of the factors and implying the utilization for the analysis and
improvement management (Pathan, 2016). The protocols would be implied with the alignment of
the successful development model. The management would be effective for independent
implication of the activities.
Encryption Process: The encryption process is helpful for taking care of the factors and
developing the successful management of activities taking care of the innovation technology
(Loo, Mauri & Ortiz, 2016). The information management would allow the significant
implication of the factors for development. The information would be encrypted for developing
the management of the improved information management.
Conclusion
It can be concluded from the report that the process of encryption is favourable for the
development of effective alignment of the activities and managing the development of the
successful information management. The security had been improved with the utilization of the
new underwater fibre optics for security of the information. The implication of the effective
![Document Page](https://desklib.com/media/document/docfile/pages/international-security-report-email/2024/09/08/ee58f925-670f-4dbe-a69a-6099d7a36093-page-6.webp)
5INTERNATIONAL SECURITY REPORT
security measures would help in taking care of the security measures for the Brazilian
Government.
security measures would help in taking care of the security measures for the Brazilian
Government.
![Document Page](https://desklib.com/media/document/docfile/pages/international-security-report-email/2024/09/08/925b88a9-3029-4dff-b3b2-ce8f2264428c-page-7.webp)
6INTERNATIONAL SECURITY REPORT
References
Kang, J., & Adibi, S. (2015, June). A review of security protocols in mHealth wireless body area
networks (WBAN). In International Conference on Future Network Systems and
Security (pp. 61-83). Springer, Cham.
Loo, J., Mauri, J. L., & Ortiz, J. H. (Eds.). (2016). Mobile ad hoc networks: current status and
future trends. CRC Press.
Pathan, A. S. K. (Ed.). (2016). Security of self-organizing networks: MANET, WSN, WMN,
VANET. CRC press.
Sari, A., & Karay, M. (2015). Comparative analysis of wireless security protocols: WEP vs
WPA. International Journal of Communications, Network and System Sciences, 8(12),
483.
Sarkar, S. K., Basavaraju, T. G., & Puttamadappa, C. (2016). Ad hoc mobile wireless networks:
principles, protocols, and applications. CRC Press.
Zou, Y., Zhu, J., Wang, X., & Hanzo, L. (2016). A survey on wireless security: Technical
challenges, recent advances, and future trends. Proceedings of the IEEE, 1-39.
References
Kang, J., & Adibi, S. (2015, June). A review of security protocols in mHealth wireless body area
networks (WBAN). In International Conference on Future Network Systems and
Security (pp. 61-83). Springer, Cham.
Loo, J., Mauri, J. L., & Ortiz, J. H. (Eds.). (2016). Mobile ad hoc networks: current status and
future trends. CRC Press.
Pathan, A. S. K. (Ed.). (2016). Security of self-organizing networks: MANET, WSN, WMN,
VANET. CRC press.
Sari, A., & Karay, M. (2015). Comparative analysis of wireless security protocols: WEP vs
WPA. International Journal of Communications, Network and System Sciences, 8(12),
483.
Sarkar, S. K., Basavaraju, T. G., & Puttamadappa, C. (2016). Ad hoc mobile wireless networks:
principles, protocols, and applications. CRC Press.
Zou, Y., Zhu, J., Wang, X., & Hanzo, L. (2016). A survey on wireless security: Technical
challenges, recent advances, and future trends. Proceedings of the IEEE, 1-39.
1 out of 7
Related Documents
![[object Object]](/_next/image/?url=%2F_next%2Fstatic%2Fmedia%2Flogo.6d15ce61.png&w=640&q=75)
Your All-in-One AI-Powered Toolkit for Academic Success.
 +13062052269
info@desklib.com
Available 24*7 on WhatsApp / Email
Unlock your academic potential
© 2024  |  Zucol Services PVT LTD  |  All rights reserved.