Explain impact new cryptographic security architecture

Assignment Help Basic Computer Science
Reference no: EM132389009

Crypto Security Architecture Exercise

Scenario

You work for the Apex Trucking Company. This is a firm that moves materials for clients all over North America and Europe. The leadership of the company has no real knowledge of technology, but wants to use encryption to protect the information the company has. The information to be protected consists of future marketing plans for the company, financial data, employee records, customer records, and customer shipping date.

The company wants the capability to securely allow customers to track their orders in real time from their origin to their destination on-line over the Internet. The information that is to be supplied to customers is tracking number, location of shipment, size of shipment, value of shipment, and estimated time of arrival as well as the customer contact information for this shipment.

While this information can be made available from a central server, the marketing groups in Europe, Mexico and Canada need management access to the data to enter new shipments and change orders before they ship.

The company currently is using desktops running Windows XP and Windows based servers. There are only passwords used for security, and a firewall, but no encryption to protect the information.

The project is to provide the above capability securely using encryption, as well as providing additional security to the company via encryption. You will need to address new technology, the reasons and costs behind your choices, and what policy and legal implications there are to your encryption solution

There is at least one marketing group in Mexico, Germany, and Canada, as well as three in the US. The company is based in New York. It is important that customers can rely on the shipping data being accurate, and from the company.

You're assigned this crypto architecture project.

Configuration

The current configuration has one server acting as a firewall and web server. This server is directly attached to the Internet.

There is a database server behind the firewall, as well as a separate server for HR and marketing. The marketing server needs to be securely accessed by the marketing teams. They also need to access the database server through an Internet connection to manage data and display reports.

All databases use MySQL and are currently not secured.

Constraints

Your tasking is crypto architecture. The normal replacement of computers is done on a rotating schedule. It is outside the scope of your project to plan for the replacement of computers. Your architecture should work with the computers you have. You may consider the replacement of equipment if an upgrade or new equipment would be critical to the crypto architecture.

Specific Tasking

You have been specifically tasked to do the following things and develop a complete and sound crypto architecture. Remember, the president is very knowledgeable about cryptography and wants lots of details about how you are going to implement the encryption.

1. Describe in detail what new cryptographic systems you are going to propose, how they work, and how they will enhance security. Be specific about these systems weaknesses and how you plan to compensate for the weaknesses.

2. Describe and explain the impact the new cryptographic security architecture will have on the current security features and how this impact will be mitigated.

3. What new issues will arise as a result of implementing the new cryptographic solutions and what are the arguments on either side of these issues?

4. Show a clear and detailed understanding of the existing encryption being used such as passwords, and operating encryption features not being used and whether you plan to use these or not, and if not why not.

5. How well will all these new cryptographic features work together? Identify any areas of concern, and how you propose to resolve conflicts and issues.

6. What if any current security features can be eliminated cost effectively by the new crypto architecture?

Reference no: EM132389009

Questions Cloud

What would the df value be equal to : You decide to perform an experiment to determine how many offspring out of a litter of 10 dogs have blue eyes and to use a chi square table to confirm
What would be an example of a person : What would be an example of a person who has a BMI in the "Obese" range but who is actually quite trim?
Compare and contrast linear and logistic regression methods : Compare and contrast linear and logistic regression methods. Support your answer with use cases for each regression model
GRA 41421 Data Management and Python Programming Assignment : GRA 41421 Data Management and Python Programming Assignment help and Solutions, BI Norwegian Business School, Norway-Create variables called total and average.
Explain impact new cryptographic security architecture : Describe and explain the impact the new cryptographic security architecture will have on the current security features and how this impact will be mitigated.
HTH-620 Practical Theology Assignment Problem : HTH-620 Practical Theology Assignment Help and Solution, Grand Canyon University Homework Help - Define theology and describe the various disciplines
Discussion about sustaining quality of life in the city : In this course, you explore and contribute readings to the dialogue about sustaining quality of life in the city. Each week, you read the assigned articles.
ITSA2006 Server Virtualization Assignment Problem : ITSA2006 Server Virtualization Assignment Help and Solution, Victorian Institute of Technology, Australia - Configure vNetwork Standard Switches
Approaches of the ethical egoist and the utilitarian : How would Kant's approach to this kind of example differ from the approaches of the ethical egoist and the utilitarian?

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Unsynchronized business cycles across

Given this expansion of trade, should we expect synchronized or unsynchronized business cycles across countries in the future and why.

  Decompose this graph into a collection of simple cycles

Decompose this graph into a collection of simple cycles that are disjoint (cf. Exercise 1.5) and construct an Euler cycle

  Describe the labor force

Describe the Labor Force. How is it calculated? List one demographic group that the labor force participation rate has increased for and one demographic group

  What is the complexity of your algorithm as a function of n

You have to play fair: the algorithm must make progress and eventually terminate, and the implementation must not cheat with tricks like timewasting loops. What is the complexity of your algorithm as a function of n?

  Risk analysis on a school information assets

Let's do some risk analysis on a school's information assets. The school stores many types of about students and three of these are:

  Request the assistance of the person

Write a letter in which you provide background information and request the assistance of the person you have chosen.

  Determine the utilization factor of this plant

Steam is generated in the boiler of a cogeneration plant at 600 psia and 650°F at a rate of 32 lbm/s.

  Analyze a hacking case using wireshark

Another option for the project is to analyze a hacking case using Wireshark. Wireshark is a free and open-source packet sniffer and protocol analyzer that you will learn about near the end of the class.

  Compute the determinant (det) and condition estimator

Check your solution by computing the residual. Also compute the determinant (det) and the condition estimator (rcond). What do you conclude?

  Define transformation in terms of color matching functions

Linear color spaces are obtained by choosing primaries and then constructing color matching functions for those primaries.

  Ideal op-amp and the frequency of the input signal

The Properties of an Ideal Op-Amp and The Frequency of the Input Signal

  Define the method encode so that the message is shuffled

Define the method encode so that the message is shuffled n times. To perform one shuffle, split the message in half and then take char-acters from each half.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd