Designing a secure encryption framework

Assignment Help Operating System
Reference no: EM132401416

Case Study: Designing a Secure Encryption Framework

You work for a military organization that is developing a new system to store highly sensitive data - like the PII (personally identifiable information) of military personnel. The system will have an application front-end (written in the Microsoft .NET framework) and a database at the back-end (like Microsoft SQL Server). The system should be accessible to military personnel over the Internet. In light of recent attacks on such systems, your task is to design the complete encryption framework to protect this data. Refer to the following resource to read about some of the recent attacks.

Please prepare a brief paper that addresses at a minimum the following key questions:
• What personnel records must be encrypted?
o What encryption algorithm would you recommend and why?
o Will you use symmetric key encryption or asymmetric key encryption and why?
o What would be the key length and why?
• Whichever encryption algorithm you recommend, it will use keys. How will you secure these keys?
o Will you encrypt the keys? If yes, then how will you secure the key-encrypting-keys?
o Will you restrict access to the keys? Please describe the mechanisms for this.
o Where and how will the keys be stored? How will you restrict access?
o Describe any other mechanisms you will adopt to secure the encryption keys
• Imagine a scenario in which the computer system of the person who has access to the encryption keys gets compromised. Identify additional security mechanisms to protect your data in such a scenario.
• What if the person with access to the keys goes rogue? Can your design prevent compromise of the sensitive data in such a scenario?
• What encryption techniques will secure the information when it is accessed over the Internet (data in transit)?
• List and describe briefly the policy and process-related controls included in the above encryption framework.

Use the American Psychological Association (APA) style (6th edition) to write your assignment. The length of your assignment should be 3 to 5 pages, and you should include at least three quality references.

Reference no: EM132401416

Questions Cloud

Formally define a competitive equilibrium in economy : (a) Formally define a competitive equilibrium in this economy. (b) Write down the firms' optimization problem. Depict the solution to the rm's problem
Discuss about the two-way symmetrical communication : Using theories, models and concepts discussed in the module so far, critically analyse whether two-way symmetrical communication is an ideal or a reality in 201
What is strategic effectiveness : What is strategic effectiveness? How does Caterpillar Inc. verify its strategic effectiveness.
Describe the process by which stereotypes : Describe the process by which stereotypes are formed and maintained.
Designing a secure encryption framework : What encryption algorithm would you recommend and why and What personnel records must be encrypted - Whichever encryption algorithm you recommend.
Traditional organization structure or a holacracy : Summarize Caterpillar Inc.'s organizational structure. Is it considered a traditional organization structure or a Holacracy?
Explain what a gantt chart is : Explain what a GANTT Chart is, and the associated benefits to Operational Planning. Be sure to a sample?
Define and explain small business and a franchise : 1. Define and explain small business and a franchise 2. Describe advantages and disadvantages of each of the two business structures
Describe the Political Campaign Ad : Find a YouTube clip of a current or old campaign ad that has been viewed extensively. In your screen cast you should introduce the video and describe.

Reviews

Write a Review

Operating System Questions & Answers

  Compare and contrast proprietary and open-source

Explain why your company's proprietary operating system will have to be upgraded. Explain why other operating systems may or may not fit.

  Implement the first come first serve scheduling algorithm

COSC 3406 (Programming: Java or C++) Assignment. Implement the following scheduling algorithms and report the average waiting time for all these cases. First Come First Serve and Shortest Job First and Priority Scheduling (preemptive and lower the nu..

  Does java still play a role in os x

Write a 3 page paper describing the transition from Mac OS 9 to Mac OS X. What impact did this have on the Macintosh user base? What role did Java play in this transition? Does Java still play a role in OS X?

  Discuss the benefits and drawbacks of using hibernate

Consider issues such as complexity of the application code with and without Hibernate. Explain in what ways you would consider changing the Hibernate framework.

  Evaluate ease of use of using unix file management systems

Evaluate the ease of use and efficiency of using both Windows and Unix file management systems. Of the two file management systems.

  Important information about windows operating system

Assume you have learned a great deal of important data about the Windows operating system so far. However, we have not even scratched the surface of the capabilities of Windows XP.

  Explain how you would reduce potential vulnerabilities

Explain how you would reduce potential vulnerabilities, protect against intrusion attempts, and better anticipate future threats.

  Trends in information management

Assume you have been asked to join with many other IT professionals for an hour on the local cable channel, discussing some of the current trends in information management,

  What is twos complement notation

What is twos complement notation? Why are they needed? In other words, why can't integer values be represented by ordinary binary numbers?

  What command displays the online text manual for linux

List the command that returns all man pages that mention the topic Apache.

  Explain type of damage the computer infections can do

Write one to two paragraphs on each topic below, and describe how it applies to the realm of data communication. Also discuss what type of damage these computer infections can do to data in a computer.

  Future of information technology heading

Where do you see the future of Information Technology heading?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd