Explain impact the new cryptographic security architecture

Assignment Help Basic Computer Science
Reference no: EM132588041

Scenario

You work for the Apex Trucking Company. This is a firm that moves materials for clients all over North America and Europe. The leadership of the company has no real knowledge of technology, but wants to use encryption to protect the information the company has. The information to be protected consists of future marketing plans for the company, financial data, employee records, customer records, and customer shipping date.

The company wants the capability to securely allow customers to track their orders in real time from their origin to their destination on-line over the Internet. The information that is to be supplied to customers is tracking number, location of shipment, size of shipment, value of shipment, and estimated time of arrival as well as the customer contact information for this shipment.

While this information can be made available from a central server, the marketing groups in Europe, Mexico and Canada need management access to the data to enter new shipments and change orders before they ship.

The company currently is using desktops running Windows XP and Windows based servers. There are only passwords used for security, and a firewall, but no encryption to protect the information.

The project is to provide the above capability securely using encryption, as well as providing additional security to the company via encryption. You will need to address new technology, the reasons and costs behind your choices, and what policy and legal implications there are to your encryption solution

There is at least one marketing group in Mexico, Germany, and Canada, as well as three in the US. The company is based in New York. It is important that customers can rely on the shipping data being accurate, and from the company.

You're assigned this crypto architecture project.

Configuration

The current configuration has one server acting as a firewall and web server. This server is directly attached to the Internet.

There is a database server behind the firewall, as well as a separate server for HR and marketing. The marketing server needs to be securely accessed by the marketing teams. They also need to access the database server through an Internet connection to manage data and display reports.

All databases use MySQL and are currently not secured.

Constraints

Your tasking is crypto architecture. The normal replacement of computers is done on a rotating schedule. It is outside the scope of your project to plan for the replacement of computers. Your architecture should work with the computers you have. You may consider the replacement of equipment if an upgrade or new equipment would be critical to the crypto architecture.

Specific Tasking

You have been specifically tasked to do the following things and develop a complete and sound crypto architecture. Remember, the president is very knowledgeable about cryptography and wants lots of details about how you are going to implement the encryption.

1. Describe in detail what new cryptographic systems you are going to propose, how they work, and how they will enhance security. Be specific about these systems weaknesses and how you plan to compensate for the weaknesses.

2. Describe and explain the impact the new cryptographic security architecture will have on the current security features and how this impact will be mitigated.

3. What new issues will arise as a result of implementing the new cryptographic solutions and what are the arguments on either side of these issues?

4. Show a clear and detailed understanding of the existing encryption being used such as passwords, and operating encryption features not being used and whether you plan to use these or not, and if not why not.

5. How well will all these new cryptographic features work together? Identify any areas of concern, and how you propose to resolve conflicts and issues.

6. What if any current security features can be eliminated cost-effectively by the new crypto architecture?

Reference no: EM132588041

Questions Cloud

Describe the elements seen in the painting : Choose and research on a contemporary Filipino painting made in the last 50 years that you find interesting. Include the following information:
How models influence drug additions and their significance : Prepare an essay (2 pages APA) on the psychological, social, and biological models in the causes of drug addiction. How these models influence the drug.
What do the vedas tell about hinduism : What does this suggest about who he was and what he believed? What can we learn about those that were inspired by his teachings?
What are the key features of loan management : What legislation gives ASIC power to approve financial services sector codes of conduct and Describe the key features of the Australian Bankers' Association
Explain impact the new cryptographic security architecture : Describe and explain the impact the new cryptographic security architecture will have on the current security features and how this impact will be mitigated.
Which strategies-techniques would you stop using : Which mentoring strategies and techniques would you continue using? Which strategies/techniques would you start using? Which strategies/techniques would.
Examine the maps of the islamic world : Where was the heart of each empire around 1500 and who ruled the empire? What were the strengths and weaknesses of each empire?
Privacy and security go hand in hand and hence : According to authors, privacy and security go hand in hand and hence, privacy cannot be protected without implementing proper security controls and technologies
How do the boundaries of each state change over time : How do the boundaries of each state change over time and from your book (or an internet search) what explains those changes?

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Write the bit pattern for this ip address

Take the domain name sofpower.com and find its IP address. Use this IP address instead of the domain name to visit the site. Write the bit pattern for this IP address.

  Respond to it security incidents

Discuss what incident response is, why it is needed and how it provides for a mechanism to better respond to IT security incidents.

  In what way does this affect their operation

Outline the procedure followed to create a tag when you want to use a counter.

  Designing programs to handle exceptions

Discuss the necessity of designing programs to handle exceptions of various types. Explain why its needed or not needed.

  Does the time required for an insertion increase

Implement the symbol table described in Exercise 5 by reusing the class Tree Dictionary , as described in Section 18.2.2 of this chapter.

  List and assess at least three kinds of damage a company

1. List and assess at least three kinds of damage a company could suffer when the integrity of a program or company data are compromised.

  Pick a company or business from the following list

This will be the basis for your entire final project. If you have a company or business that is not listed, get approval from your instructor.

  Compute function point value

Compute function point value for a project with the following domain characteristics:

  Contemporary internal information system

You should complete the following tasks for the given business scenario. You are one of a team of newly graduated software engineers working on a project to build the infrastructure of an organization with an intensive and data sensitive internal ..

  Digital forensics world

The Physical Model was based on the idea that people did not really understand the work involved in the digital forensics world or how to treat it in court.

  How many instructions can the processor execute

Assume that we are working on a workstation with an instruction rate of 500 MIPS. How many instructions can the processor execute between the receipt of each individual bit of the message?

  Construct an e-r diagram for a car insurance company

Construct an E-R diagram for a car insurance company whose customers own one or more cars each. Each car has associated with it zero to any number of recoreded accidents.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd