Reference no: EM131441275 , Length: 3
Suppose you are the Information Security Director at a small software company. The organization currently utilizes a Microsoft Server 2012 Active Directory domain administered by your information security team. Mostly software developers and a relatively small number of administrative personnel comprise the remainder of the organization.
You have convinced business unit leaders that it would be in the best interest of the company to use a public key infrastructure (PKI) in order to provide a framework that fosters confidentiality, integrity, authentication, and nonrepudiation.
Email clients, virtual private network (VPN) products, Web server components, and domain controllers would utilize digital certificates issued by the certificate authority (CA). Additionally, the company would use digital certificates to sign software developed by the company in order to demonstrate software authenticity to the customer.
Write a two to three (2-3) page paper in which you:
Analyze the fundamentals of PKI, and determine the primary ways in which its features and functions could benefit your organization and its information security department.
Propose one (1) way in which the PKI could assist in the process of signing the company's software, and explain the main reason why a customer could then believe that software to be authentic.
Compare and contrast public and in-house CAs. Include the positive and negative characteristics of each type of certificate authority, and provide a sound recommendation of and a justification for which you would consider implementing within your organization. Explain your rationale.
Use at least three (3) quality resources in this assignment (no more than 2-3 years old) from material outside the textbook. Note: Wikipedia and similar Websites do not qualify as quality resources.
Your assignment must follow these formatting requirements:
Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. Check with your professor for any additional instructions.
Include a cover page containing the title of the assignment, the student's name, the professor's name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length.
The specific course learning outcomes associated with this assignment are:
Explain how businesses apply cryptography in maintaining information security.
Use technology and information resources to research issues in information systems security.
Write clearly and concisely about network security topics using proper writing mechanics and technical style conventions
Middle of organizational complexity
: 1. Question: What does Haldeman mean when he says the hero stands in the middle of organizational complexity, neither tied to the past nor over-invested in a desired future?
|
Food is manufactured by rening raw oils and blending
: A food is manufactured by rening raw oils and blending them together. The raw oils come in two categories: The final product sells at $180 per tonne. Vegetable oils and non-vegetable oils require different production lines for refining. It is not pos..
|
Discuss the features of the rope would you look
: A wire rope made up of many strands of small diameter wire passes over a pulley before being used to lift heavy loads. Discuss the features of the rope would you look for to analyse in order to determine the cause of failure
|
Largest and fastest growing industries in the world
: As one of the largest and fastest growing industries in the world, hospitality continues to incorporate total quality management (TQM) into service areas in an effort to meet the demands of tourists and travelers. How does the "whatever it takes" ..
|
Analyze the fundamentals of public key infrastructure
: Suppose you are the Information Security Director at a small software company. The organization currently utilizes a Microsoft Server 2012 Active Directory domain administered by your information security team. Mostly software developers and a rel..
|
Job description and job analysis
: What is the relationship between the job description (JD) and job analysis (JA)? Explain how the JD and JA influence the compensation structure such as ranking, grades, exempt, non-exempt status or any other identifiers in the structure.
|
Assess potential corporate level strategies for organization
: Assess potential global strategies for Apple Corporation? Evaluate potential business level strategies for the organization. Assess potential corporate level strategies for the organization. Assess potential global strategies for the organization.
|
Management of human resource in healthcare
: Synthesizing what you have learned throughout the course, develop a human resources plan or strategy for an urgent-care clinic. At a minimum, your plan or strategy should consider the following:
|
Maintain effective change in the organizational culture
: In the McKinsey article “Leader Change Thyself”, the author says that organizations do not change people do. If the role of the leader in today’s business environment is to move people, and to create change you must move followers, what strategies do..
|