Project Phases & Tasks Phase 1: Understanding and Defining Requirements  Task: Each group will select a hypothetical organization type (e.g., healthcare, finance, or retail) and analyze its unique security needs. Deliverable:

Project Title: Designing a Secure Communication Framework for an Enterprise

Objective

Students will work in small groups to design a secure communication framework for a hypothetical organization. They’ll explore structures, transmission methods, security measures, and best practices to create a solution that aligns with confidentiality, integrity, and availability (CIA) principles.

Project Phases & Tasks

Phase 1: Understanding and Defining Requirements 

  1. Task: Each group will select a hypothetical organization type (e.g., healthcare, finance, or retail) and analyze its unique security needs.
  2. Deliverable: A brief outline that defines the organization’s communication needs, such as secure file transfer, encrypted messaging, or remote access, and the importance of CIA principles for each type.
    • Learning Outcome Mapping1, 2

Phase 2: Analyzing Transmission Methods and Security Measures 

  1. Task: Groups will research various transmission methods (e.g., VPN, TLS, IPsec) and security protocols suitable for their organization’s communication framework.
  2. Deliverable: A report summarizing recommended transmission methods and security protocols, explaining how each method supports confidentiality, integrity, and availability.
    • Learning Outcome Mapping1, 5

Phase 3: Establishing Controls within Business Applications

  1. Task: Using the organization’s needs and chosen transmission methods, groups will outline at least three security controls for business applications (e.g., access control, data encryption, intrusion detection).
  2. Deliverable: A control plan listing each control, the security strategy it supports, and how it aligns with the organization’s security goals.
    • Learning Outcome Mapping3

Phase 4: Designing a Cryptographic Strategy for Data Protection 

  1. Task: Groups will identify cryptographic measures to secure sensitive information within the organization’s communication framework (e.g., data encryption standards, hashing for integrity, digital certificates).
  2. Deliverable: A cryptographic strategy outlining selected methods, rationale, and how these methods protect data confidentiality and integrity.
    • Learning Outcome Mapping5

Phase 5: Evaluating Procedures and Standards 

  1. Task: Groups will evaluate high-level procedures and standards relevant to their communication framework (e.g., compliance standards, disaster recovery plans, regular security audits).
  2. Deliverable: A summary evaluating the impact of each procedure or standard on the overall security strategy, and how they support or enhance the framework.
    • Learning Outcome Mapping4

Final Deliverables

  1. Group Report: A document compiling all sections from each phase, forming a cohesive security plan for the organization’s communication framework. Final product should be 24 pages in length. APA formatting is REQUIRED.
  2. Presentation: A 10 PowerPoint slide presentation where each group explains their framework design and decision-making process.