Encryption Policy for CIO review

Create an Encryption Policy for CIO review. Use the organization you chose in the discussion Classifying an Organization's Sensitive Data.

Write a 2- to 2½-page policy, and ensure you:

  List the organization’s sensitive data that must be protected.
  Complete a matrix that compares the asymmetric and symmetric encryption methodologies (PKI, TLS, SSL) for protecting data within the network.
  Describe at least 2 primary threats that could compromise the organization’s data.
  Describe how the encryption methodologies thats hould be implemented to protect the organization’s sensitive data.

Sample Solution