Reference no: EM13819856
Case Study: Public Key Infrastructure
Suppose you are the Information Security Director at a small software company. The organization currently utilizes a Microsoft Server 2012 Active Directory domain administered by your information security team. Mostly software developers and a relatively small number of administrative personnel comprise the remainder of the organization. You have convinced business unit leaders that it would be in the best interest of the company to use a public key infrastructure (PKI) in order to provide a framework that fosters confidentiality, integrity, authentication, and nonrepudiation. Email clients, virtual private network (VPN) products, Web server components, and domain controllers would utilize digital certificates issued by the certificate authority (CA). Additionally, the company would use digital certificates to sign software developed by the company in order to demonstrate software authenticity to the customer.
Write a two to three page paper in which you:
Analyze the fundamentals of PKI, and determine the primary ways in which its features and functions could benefit your organization and its information security department.
Propose one way in which the PKI could assist in the process of signing the company's software, and explain the main reason why a customer could then believe that software to be authentic.
Compare and contrast public and in-house CAs. Include the positive and negative characteristics of each type of certificate authority, and provide a sound recommendation of and a justification for which you would consider implementing within your organization. Explain your rationale.
Determine upper and lower control limits
: a. Determine upper and lower control limits that will include roughly 97 percent of the sample means when the process is in control.
|
Developed an early-start schedule for a seven-month
: Developed an early-start schedule for a seven-month ERP programming and implementation project for Quigg Brothers Construction Co. You note that there will be a heavy human resource need at the beginning of the project, and requirements will taper of..
|
What kind of leader is the individual
: What kind of leader is the individual? Describe the individual’s leadership style Describe the individual’s communication style Is this leader ethical? Why or why not? Do you respect him or her? Why or why not? How effective do you consider the leade..
|
Critically analyses the key strategic issues the firm
: Critically analyses the key strategic issues the firm faces in expanding into this market (opportunities and threats in the firm's external environment plus strengths and weaknesses in the firm's internal environment).
|
Analyze the fundamentals of public key infrastructure
: Analyze the fundamentals of PKI, and determine the primary ways in which its features and functions could benefit your organization and its information security department.
|
Compress a schedule for a product development
: Your boss has just told you that you must compress a schedule for a product development project. Name and describe in your own words at least three strategies you could use. What would be the best way to present these to your boss?
|
Social engineering attacks and counterintelligence
: Social Engineering Attacks and Counterintelligence
|
About company rituals and organizational cultural values
: Think about company rituals and organizational cultural values (behavior/communication etc.) that take place in your workplace. (See table 4.1, in Clampitt textbook). Discuss any ONE that is indicative of your company. Feel free to refer to Dr. Schei..
|
Develop an overall architecture for the system
: Develop an overall architecture for the system described in the assigned reading. Your architecture should be based on any one of the common architectural patterns.
|