Develop a plan to deploy public key infrastructure

Assignment Help Computer Engineering
Reference no: EM132385322

Assignment: Learning Objectives and Outcomes

• Develop a plan to deploy public key infrastructure (PKI) and encryption solutions to protect data and information.

Assignment Requirements

In this assignment, you play the role of chief information technology (IT) security officer for the Quality Medical Company (QMC). QMC is a publicly traded company operating in the pharmaceutical industry.

QMC is expanding its arena of work through an increase in the number of clients and products. The senior management of the company is highly concerned about complying with the multitude of legislative and regulatory laws and issues in place. The company has an internal compliance and risk management team to take care of all the compliance-related issues. The company needs to make important decisions about the bulk of resources they will need to meet the voluminous compliance requirements arising from the multidimensional challenge of expansion.

QMC will be required to conform to the following compliance issues:

• Public-company regulations, such as the Sarbanes-Oxley (SOX) Act

• Regulations affecting financial companies, companies that make loans and charge interest, such as the U.S. Securities and Exchange Commission (SEC) rules and Gramm-Leach-Bliley Act (GLBA)

• Regulations affecting healthcare privacy information, such as Health Insurance Portability and Accountability Act (HIPAA)

• Intellectual Property Law that is important for information asset protection particularly for organizations in the pharmaceutical and technology industry

• Regulations affecting the privacy of information, including personal identification information, such as personally identifiable information (PII) regularly collected from employees, customers, and end users

• Corporate governance policies including disclosures to the board of directors and the auditors and the policies related to human resources, governance, harassment, code of conduct, and ethics

Compliance with regulatory requirements implies encrypting sensitive data at rest (DAR) and allowing access to role-holders in the enterprise who require the access. It also implies that sensitive data in motion (DIM) or data that is being communicated via e-mail, instant message (IM), or even Web e-mail must be suitably protected and sent only to the individuals who have a right to view it. The company is conscious about the loss they may face in terms of penalty and brand damage if they fail to abide by the compliance laws, especially in the online information transfer phase. Therefore, as a dedicated employee, your task is to develop a content monitoring strategy using PKI as a potential solution. You will need to determine a process or method to identify multiple data types, processes, and organizational policies. Incorporate them into a plan, and select a PKI solution that will effectively address the content management needs of your company.

You need to present your PKI solution in the form of a professional report to the senior management.

Submission Requirements: • Format: Microsoft Word

• Font: Arial, 12-Point, Double-Space

• Citation Style: APA

• Length: 1-2 pages

Self-Assessment Checklist

Use the following checklist to support your work on the assignment:

• I have identified specific data types related to the specific compliance regulatory requirements.

• I have indicated a solution for sharing data beyond the borders of the organization.

• I have appropriately selected and developed a PKI solution for content control.

• I have followed the submission requirements.

Reference no: EM132385322

Questions Cloud

How you will use the knowledge and skills to support goals : After addressing the problems, conclude your paper with details on how you will use this knowledge and skills to support your professional and or academic goals
Create security policy that would benefit your organization : Create a security policy that would benefit your organization. Suggest an audit mechanism to determine complianceUse the following Format for your policy.
About security flaws in unix-windows operating systems : Conduct research using the library and Internet for information about security flaws in UNIX, open source, and Windows operating systems.
Successful or unsuccessful with implementing strategies : Your overall thoughts of whether the organization was successful or unsuccessful with implementing the strategies from each of the above chapters.
Develop a plan to deploy public key infrastructure : In this assignment, you play the role of chief information technology (IT) security officer for the Quality Medical Company (QMC). QMC is a publicly traded.
ECO5000 Economics for Managers- Assignment Problem : ECO5000 Economics for Managers Assignment Help and Solutions-University of Southern Queensland- Australia-Prepare a manufacturing cost table up to 15 units.
Discuss remote access solutions and virtual private networks : Discuss with your peers which of the two remote access solutions, virtual private networks (VPNs) or hypertext transport protocol secure (HTTPS), you will rate.
Define relationship between nist and fisma : Discuss in 500 words or more the relationship between NIST and FISMA. Cite your sources. Do not copy. Write in essay format not in bulleted, numbered or other.
Was variable cost increased or decreased : Has the company experienced declining or increased cost attributed to computerization? Was variable cost increased or decreased? Were fixed cost increased?

Reviews

Write a Review

Computer Engineering Questions & Answers

  Mathematics in computing

Binary search tree, and postorder and preorder traversal Determine the shortest path in Graph

  Ict governance

ICT is defined as the term of Information and communication technologies, it is diverse set of technical tools and resources used by the government agencies to communicate and produce, circulate, store, and manage all information.

  Implementation of memory management

Assignment covers the following eight topics and explore the implementation of memory management, processes and threads.

  Realize business and organizational data storage

Realize business and organizational data storage and fast access times are much more important than they have ever been. Compare and contrast magnetic tapes, magnetic disks, optical discs

  What is the protocol overhead

What are the advantages of using a compiled language over an interpreted one? Under what circumstances would you select to use an interpreted language?

  Implementation of memory management

Paper describes about memory management. How memory is used in executing programs and its critical support for applications.

  Define open and closed loop control systems

Define open and closed loop cotrol systems.Explain difference between time varying and time invariant control system wth suitable example.

  Prepare a proposal to deploy windows server

Prepare a proposal to deploy Windows Server onto an existing network based on the provided scenario.

  Security policy document project

Analyze security requirements and develop a security policy

  Write a procedure that produces independent stack objects

Write a procedure (make-stack) that produces independent stack objects, using a message-passing style, e.g.

  Define a suitable functional unit

Define a suitable functional unit for a comparative study between two different types of paint.

  Calculate yield to maturity and bond prices

Calculate yield to maturity (YTM) and bond prices

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd