Already have an account? Get multiple benefits of using own account!
Login in your account..!
Remember me
Don't have an account? Create your account in less than a minutes,
Forgot password? how can I recover my password now!
Enter right registered email to receive password!
Case Study: Designing a Secure Encryption Framework
You work for a military organization that is developing a new system to store highly sensitive data - like the PII (personally identifiable information) of military personnel. The system will have an application front-end (written in the Microsoft .NET framework) and a database at the back-end (like Microsoft SQL Server). The system should be accessible to military personnel over the Internet. In light of recent attacks on such systems, your task is to design the complete encryption framework to protect this data. Refer to the following resource to read about some of the recent attacks.
Please prepare a brief paper that addresses at a minimum the following key questions:• What personnel records must be encrypted?o What encryption algorithm would you recommend and why?o Will you use symmetric key encryption or asymmetric key encryption and why?o What would be the key length and why?• Whichever encryption algorithm you recommend, it will use keys. How will you secure these keys?o Will you encrypt the keys? If yes, then how will you secure the key-encrypting-keys?o Will you restrict access to the keys? Please describe the mechanisms for this.o Where and how will the keys be stored? How will you restrict access?o Describe any other mechanisms you will adopt to secure the encryption keys• Imagine a scenario in which the computer system of the person who has access to the encryption keys gets compromised. Identify additional security mechanisms to protect your data in such a scenario.• What if the person with access to the keys goes rogue? Can your design prevent compromise of the sensitive data in such a scenario?• What encryption techniques will secure the information when it is accessed over the Internet (data in transit)?• List and describe briefly the policy and process-related controls included in the above encryption framework.
Use the American Psychological Association (APA) style (6th edition) to write your assignment. The length of your assignment should be 3 to 5 pages, and you should include at least three quality references.
The Shortest Job Next (SJN) algorithm queues processes in a way that the ones that use the shortest CPU cycle will be selected for running rst.
Develop a user mode command interpreter which support list-short.
Analysis and implementation of algorithms for memory allocation in operating system, Explain First-t and best-t methods are used in memory allocation in operating systems.
Forking the child process
Write a multi-threaded program to solve producer and consumer problem
n a competitive market place (pure competition) is it possible to continually sell your product at a price above the average cost of production.
Simulate the long-term scheduler, the short-term scheduler and the I/O scheduler of the computer using the First-Come-First-Serve algorithm.
Research paper discussing the issues with Trusted Platform Module (TPM)
Explain a complication that concurrent processing adds to an operating system.
Use the semaphore methods to control the concurrency of the solution
Virtual machines supported by a host operating system
Discuss an application that would benefit from the use of barrier synchronization
Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!
whatsapp: +1-415-670-9521
Phone: +1-415-670-9521
Email: [email protected]
All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd