Crypto security architecture exercise

Assignment Help Basic Computer Science
Reference no: EM132419670

Crypto Security Architecture Exercise

Scenario

You work for the Apex Trucking Company. This is a firm that moves materials for clients all over North America and Europe. The leadership of the company has no real knowledge of technology, but wants to use encryption to protect the information the company has. The information to be protected consists of future marketing plans for the company, financial data, employee records, customer records, and customer shipping date.

The company wants the capability to securely allow customers to track their orders in real time from their origin to their destination on-line over the Internet. The information that is to be supplied to customers is tracking number, location of shipment, size of shipment, value of shipment, and estimated time of arrival as well as the customer contact information for this shipment.

While this information can be made available from a central server, the marketing groups in Europe, Mexico and Canada need management access to the data to enter new shipments and change orders before they ship.

The company currently is using desktops running Windows XP and Windows based servers. There are only passwords used for security, and a firewall, but no encryption to protect the information.

The project is to provide the above capability securely using encryption, as well as providing additional security to the company via encryption. You will need to address new technology, the reasons and costs behind your choices, and what policy and legal implications there are to your encryption solution

There is at least one marketing group in Mexico, Germany, and Canada, as well as three in the US. The company is based in New York. It is important that customers can rely on the shipping data being accurate, and from the company.

You're assigned this crypto architecture project.

Configuration

The current configuration has one server acting as a firewall and web server. This server is directly attached to the Internet.

There is a database server behind the firewall, as well as a separate server for HR and marketing. The marketing server needs to be securely accessed by the marketing teams. They also need to access the database server through an Internet connection to manage data and display reports.

All databases use MySQL and are currently not secured.

Constraints

Your tasking is crypto architecture. The normal replacement of computers is done on a rotating schedule. It is outside the scope of your project to plan for the replacement of computers. Your architecture should work with the computers you have. You may consider the replacement of equipment if an upgrade or new equipment would be critical to the crypto architecture.

Specific Tasking

You have been specifically tasked to do the following things and develop a complete and sound crypto architecture. Remember, the president is very knowledgeable about cryptography and wants lots of details about how you are going to implement the encryption.

1. Describe in detail what new cryptographic systems you are going to propose, how they work, and how they will enhance security. Be specific about these systems weaknesses and how you plan to compensate for the weaknesses.

2. Describe and explain the impact the new cryptographic security architecture will have on the current security features and how this impact will be mitigated.

3. What new issues will arise as a result of implementing the new cryptographic solutions and what are the arguments on either side of these issues?

4. Show a clear and detailed understanding of the existing encryption being used such as passwords, and operating encryption features not being used and whether you plan to use these or not, and if not why not.

5. How well will all these new cryptographic features work together? Identify any areas of concern, and how you propose to resolve conflicts and issues.

6. What if any current security features can be eliminated cost effectively by the new crypto architecture?

Reference no: EM132419670

Questions Cloud

How one can use hash values to log into system : Write a 2 pages paper on how one can use hash values to log into a system, crack a network, etc.
How information technology can impact policing in the future : Describe how information technology can impact policing in the future. (What are some examples of the impact?) Analyze three current advancements in technology.
Accounting of subsidiaries under aspe : What options exist for the accounting of subsidiaries under ASPE? Note that subsidiaries are investments where the parent has control over the subsidiary.
Drive the closed form solution of Timoshenko beam equation : Question: Drive the closed form solution of Timoshenko beam equation. And establish the relation for clamped-clamped beam
Crypto security architecture exercise : Describe and explain the impact the new cryptographic security architecture will have on the current security features and how this impact will be mitigated.
Explain the different categories of financial assets : Explain the different categories of financial assets (such as passive investments) and their measurement under IFRS and ASPE.
What are the disadvantages of psychological profiling : Write a 5 to 8-page persuasive paper (excluding cover and reference pages) that debates the value and ethical concerns of Psychological Profiling.
Discuss what you have read about police stress : Discuss what you have read about police stress in this chapter with someone who is not a police officer. Ask this person how stress is similar or different.
Vibration of Mechanical System Assignment : Vibration of Mechanical System Assignment - Multi-DOF system, Vibration Absorption, Vibration of an Euler-Bernoulli beam (on MATLAB)

Reviews

Write a Review

Basic Computer Science Questions & Answers

  What do you think were real reasons why vcf system failed

What do you think were the real reasons why the VCF system failed?

  Write an error message and exit the program

write an error message and exit the program.

  Describe what policy changes you would implement to mitigate

The damaging scandals of Wikileaks/Bradley Manning and Edward Snowden demonstrate a series of critical failures of existing security policy.1. For both scandals describe the policy failures that you believe were responsible for the incidents. 2. Desc..

  Configure input polarity to active low

Configure input polarity to active low.

  Major debates over macroeconomic policy

This week requires the student to address six unresolved issues in macroeconomics, each of which is central to current political debates.

  Compare and contrast two influential influencers

Using Social Blade and online resources, compare and contrast two influential influencers. What is their mission/goal? What are their monthly subscriptions?

  Benefits of use-case modeling

Analyze the benefits of use-case modeling and isolate the most advantageous benefit to the firm you currently work or worked in the past and state why.Describe the biggest challenge to the successful use of use-case modeling and recommend how to over..

  Describe how the reliability metrics of a system

Describe how the reliability metrics of a system that monitors patients in a hospital intensive care unit and an automated vending machine control system might differ in terms of dependability, availability, reliability, safety, and security.

  Write specific formulas and functions

Consider the following scenario: As supervisor for a retail company, you supervise six people in your location. You are responsible for their payroll and commissions each week. Use the data provided to create a worksheet described below

  Legalization of presently illegal substances

Of what significance is the elasticity of demand for drugs in the debate about legalization of presently illegal substances?

  Provided with strong educational programs

At the University, it is a priority that students are provided with strong educational programs and courses that allow them to be servant-leaders in disciplines

  What does it mean to have a market in equilibrium

What does it mean to have a market in equilibrium? How do changes in supply or price affect this equilibrium?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd