Analyze the fundamentals of pki

Assignment Help Management Information Sys
Reference no: EM131613142

Case Study : Public Key Infrastructure

Suppose you are the Information Security Director at a small software company. The organization currently utilizes a Microsoft Server 2012 Active Directory domain administered by your information security team.

Mostly software developers and a relatively small number of administrative personnel comprise the remainder of the organization.

You have convinced business unit leaders that it would be in the best interest of the company to use a public key infrastructure (PKI) in order to provide a framework that fosters confidentiality, integrity, authentication, and nonrepudiation.

Email clients, virtual private network (VPN) products, Web server components, and domain controllers would utilize digital certificates issued by the certificate authority (CA). Additionally, the company would use digital certificates to sign software developed by the company in order to demonstrate software authenticity to the customer.

Write a two to three (2-3) page paper in which you:

1. Analyze the fundamentals of PKI, and determine the primary ways in which its features and functions could benefit your organization and its information security department.

2. Propose one (1) way in which the PKI could assist in the process of signing the company's software, and explain the main reason why a customer could then believe that software to be authentic.

3. Compare and contrast public and in-house CAs. Include the positive and negative characteristics of each type of certificate authority, and provide a sound recommendation of and a justification for which you would consider implementing within your organization. Explain your rationale.

4. Use at least three (3) quality resources in this assignment (no more than 2-3 years old) from material outside the textbook. Note: Wikipedia and similar Websites do not qualify as quality resources.

Reference no: EM131613142

Questions Cloud

Construct a query to show the expected payment date : Construct a query that will show the number of days that exist between the first invoice and last invoice, for each month.
Articulate personal interaction with modern leadership : Although the formal paper this week has some personal response, these Journals are intended to be specifically informal and self-reflective.
How economic evaluation can be used using basic information : In your initial posting explain how economic evaluation can be used using basic information. Using the major types of health outcomes.
Establish a policy for reporting theft or misplacement : Establish a customized corporate usage policy for mobile devices and establish a policy for reporting theft or misplacement
Analyze the fundamentals of pki : Determine the primary ways in which its features and functions could benefit your organization and its information security department.
How will health care reform address the inefficiencies : In your initial posting describe how the health insurance market has been inefficient historically and how they can be efficient when coverage is lacking.
Estimate the equivalent annual cost of these computers : The estimated cost to purchase and maintain 20 computers is $20,000; $30,000; $30,000; estimate the equivalent annual cost of these computers.
Create a timeline that shows four technological developments : Create a timeline that shows four technological developments that have had an impact on the way that people seek out marriage or life partners.
Transition from volume-based to value-based healthcare : Review at least one peer reviewed, profession journal article or detailed news article discussing government mandates for health care such as the 2009 HITECH.

Reviews

Write a Review

Management Information Sys Questions & Answers

  What leadership or management violation has victor committed

What ethical leadership and management violation has Victor committed? Explain. What white-collar crimes, if any, did Victor and John commit?

  Create a policy for employee use of technology

For the employee handbook, create a policy for employee use of technology because new sources of social media and more advanced electronic devices are regularly being introduced to the market.

  What is the normal time and the standard time

Peter Rourke, a loan processor at Wentworth Bank, has been timed performing four work elements,- What is the normal time? - What is the standard time?

  Does cause and effect diagram conflict with flowchart

Does your cause-and-effect diagram conflict with your flowchart? If so, how? - Does the cause-and-effect diagram reveal any process steps that were not previously documented?

  Explain what is the organization''s structure

What is the organization's structure? How decentralized or centralized is it and What are the lines of authority and communication?

  Describe positive aspect of creating an online questionnaire

Describe the positive and negative aspects of creating and conducting an online questionnaire. Speculate on the reliability of the collected data. Recommend two methods that you can use to validate the collected data.

  Explain how you would execute keyword and metadata search

explain how you would execute the keyword and metadata search and some of the tools used in your efforts to acquire and analyze the digital evidence.

  Differences between scorecards and dashboards

Discuss the purpose and other considerations behind dashboards in less than one page. Highlight the differences between scorecards and dashboards; and BAM and BPM

  Planning an it infrastructure audit for compliance

Term Paper: Planning an IT Infrastructure Audit for Compliance. Identify the critical requirements of the audit for your chosen organization and explain why you consider them to be critical requirements

  Define typical attacks make reference to corresponding layer

With limited time and resources your manager wants everyone to suggest the structure of a network defense system to protect the computers and the network. Since this is an open discussion if your favorite idea has been discussed "to death" pick th..

  Backup terminology

This post addresses Windows 7 and backup terminology - Briefly explain the three types of Windows 7 updates: Important, Recommended, and Optional.

  Web-based networkshow have the internet intranets and

web-based networkshow have the internet intranets and extranets affected the types and uses of data resources available

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd