Professor Dr. Mark O. Afolabi
Week 5 Case Study Phase 2
Communication Plan Concept
The communication means has over the years considerably evolved to constitute the today’s communication channels. The currently existing channels have generally simplified the process of communication making it more efficient and secure (Manna et al., 2018). The communication evolution which has been seen lately is contributed to majorly by the military that has spent lots of years working to secure and enhance their communication with the aim of ensuring that the information reaches the intended destination in time and a secure form. About the given scenario, the communication plan would entail:
The objective of the soldier’s communication, we can call him George who has the intention of communicating about the national infrastructure protection plan is required to secure timely efficient and secure information sharing through a memo. The audiences are the members of the troop of the battalion of George, and even George himself and this data which is shared will concern the national infrastructure protection plan (Das & Dutta, 2018). The cryptography method of sharing information would, therefore, be the most recommended way to go about this case.
Cryptography is termed as the science of communicating information more securely from one source to another. In the modern world, the method is widely applied in the communication systems as well as the payment systems like the cell-phones, e-commerce website, credit cards and even computer passwords. Cryptography would be used in this case with the aim of preventing the third parties who do not belong to the sender’s troop from gaining access to the personal information (Lundgren & McMakin, 2018). The method is recommended for this type of communication since it has been the most appropriate method for sensitive information sharing such as social security numbers and even like in this instance the discussion of the critical memo on the national infrastructure protection plan which should be handled with a lot more privacy. The information here is keyed in online to render hacking strategies as well as the identity theft more sophisticated. In this case, therefore, this method will ensure the protection of the data contained in the memo by offering the essential security measures.
The below diagram demonstrates the flow of information under the category of cryptography means of communication.
Plain text Cipher text Plain text
In the cryptography, the flow of information, in this case, would take place in the following ways. The sender, who in this case is George and has the intention of sending the memo, will take part in writing the note and saving it in the computer. The George’s computer will, therefore, do the encryption to the information in the data contained in the memo and whiles it identifies the receiver of the data which are in this case the troop members of George. George will then generate both the public and private keys. Upon doing so, he shares the public key with the troop members who are also expected to create both the two keys on their own (Fearn, 2016). George will, therefore, use the other key, the private key to in conducting the encryption of the information on the national infrastructure protection plan content and after that convey it over via the network to the troop members. The troop members upon receiving the information will decrypt it by the use of their military radio signals with the aim of enhancing information sharing.
The sender of the information in this case who is George uses the private key which is also referred to as the systematic key to exchange the data between the two parties involved, him and the troop members. This will happen since both George and the troop members have agreed on the key to be used as the private one for both encryption and decryption. After that, George would use the key to decrypt back the ciphertext into the plain one (Lundgren & McMakin, 2018). This will give him the ample and more efficient manner to encrypt information contained in the memo. Before sending the message, the sender, George has to share the key more securely to avoid access to the data by the attackers who would otherwise merely decipher messages from every troop member. George must, therefore, learn how to share the key for this securely majorly poses a challenge to many individuals in such positions as his.
The public key which is created by both George and the troop members, however, can be offered and distributed to anybody. When using this key, George will just like stated initially, connect to the internet using the TLS and encrypt data by the use of the systematic key before sending it to the troop members. The key will then authenticate the identity of both the George and the troop members to offer extra security (Fearn, 2016). In the security department in summation, cryptography means of communication is always the primary method of communicating to the troop members since it provides total security for the conveyed information and prevents any person with evil will agenda from getting access to the vital information of the security department for proper national protection measures. The national infrastructure protection memo being an essential tool in informing the troop about an occurrence should, therefore, be communicated through such a method.
Das, R., & Dutta, S. (2018). A Private Key Encryption Scheme based on Amicable Number with User defined Cipher Block Sequencing Techniques.
Fearn-Banks, K. (2016). Crisis communications: A casebook approach. Routledge.
Lundgren, R. E., & McMakin, A. H. (2018). Risk communication: A handbook for communicating environmental, safety, and health risks. John Wiley & Sons.
Manna, S., Banerjee, S., Panja, P., Das, R., & Dutta, S. (2018). Secure Symmetric Key Transmission of Messages Using Random Shuffling of Spiral Matrix and Multiplicative Inverse (RSSMMI). In Advanced Computational and Communication Paradigms (pp. 135-143). Springer, Singapore.