Analyze the fundamentals of pki

Assignment Help Case Study
Reference no: EM131155270

Case Study: Public Key Infrastructure

Use at least three quality resources in this assignment (no more than 2-3 years old)

Suppose you are the Information Security Director at a small software company. The organization currently utilizes a Microsoft Server 2012 Active Directory domain administered by your information security team. Mostly software developers and a relatively small number of administrative personnel comprise the remainder of the organization. You have convinced business unit leaders that it would be in the best interest of the company to use a public key infrastructure (PKI) in order to provide a framework that fosters confidentiality, integrity, authentication, and nonrepudiation. Email clients, virtual private network (VPN) products, Web server components, and domain controllers would utilize digital certificates issued by the certificate authority (CA). Additionally, the company would use digital certificates to sign software developed by the company in order to demonstrate software authenticity to the customer.

Analyze the fundamentals of PKI, and determine the primary ways in which its features and functions could benefit your organization and its information security department.

Propose one way in which the PKI could assist in the process of signing the company's software, and explain the main reason why a customer could then believe that software to be authentic.

Compare and contrast public and in-house CAs. Include the positive and negative characteristics of each type of certificate authority, and provide a sound recommendation of and a justification for which you would consider implementing within your organization. Explain your rationale.

Use at least three quality resources in this assignment (no more than 2-3 years old) from material outside the textbook. Note: Wikipedia and similar Websites do not qualify as quality resources.

Your assignment must follow these formatting requirements:

Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. Check with your professor for any additional instructions.

Include a cover page containing the title of the assignment, the student's name, the professor's name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length.

The specific course learning outcomes associated with this assignment are:

Explain how businesses apply cryptography in maintaining information security.

Use technology and information resources to research issues in information systems security.

Write clearly and concisely about network security topics using proper writing mechanics and technical style conventions.

Reference no: EM131155270

Questions Cloud

Do a careful search of commercially available electronic : The latter is available from the Trace Research and Development Center at the University of Wisconsin, Madison. Also try visiting the applicable websites.
Non-compliance with health and safety legislation : What actions should workers take if they identify instances of non-compliance with health and safety legislation, codes, and standards?
Calculate the expected return for each individual stock : Calculate the expected return for each individual stock.-  Calculate the standard deviation for each individual stock.
Briefly describe any population or topic you are discussing : List and describe each major point (what it means). Briefly state how each major point directly relates to your thesis statement or research question and test (topic of your paper). Provide a citation (not a reference) for each major point. This w..
Analyze the fundamentals of pki : Analyze the fundamentals of PKI, and determine the primary ways in which its features and functions could benefit your organization and its information security department.
How are health and safety committees and hsrs selected : How are health and safety committees and HSRs selected, and what are their responsibilities?
Basic theories and principles or intention of health : Health and safety codes and regulations are intended to support the basic theories and principles or intention of health and safety regulation. How can they do this?
What does this mean in terms of this person''s probable : A person is known to have spinal cord injury (SCI) at the C5-C6 level. What does this mean in terms of this person's probable motoric and sensory abilities and limitations?
Describe the audit and the program evaluation : For this Assignment, select one type of audit and one type of program evaluation for an organization with which you are familiar. Consider how the audit and program evaluation are similar and different. Also think about how they relate to accounta..

Reviews

Write a Review

Case Study Questions & Answers

  What procedures they should adopt in terms of purchasing

You have been hired by the General Manager as an expert to advise him on what procedures they should adopt in terms of purchasing, receiving, storage and production that would mitigate these customers' comments and generally improve the performanc..

  Evaluate the organizations purpose and goals

Evaluate the organization's purpose and goals is the business non-profit or does it sell widgets. It is recommended that you create a list of what the company does.

  Judge the extent to which the marketing plan at just us

From the case study, judge the extent to which the marketing plan at Just Us! is outdated. Propose two (2) ways that Just Us! could improve the customer experience and thus sustain future growth.

  How do you feel about the external validity

Which factors affect the internal validity of Xaviers study given the experimental design - how do you feel about the external validity of this study?

  Analyze the case study

Analyze the Case Study, and develop the conclusions, recommendations, and implications in a one to one and half page APA formatted paper

  How does social media represent a threat

How does social media represent a threat to companies who limit their customer support services to traditional channels?

  Case study - adobe systems incorporated

While answering the questions, please restrict yourselves to the information provided in the case. Also, try to imagine that this is the time when the case was written, and NOT 2015.

  Dmv case study

Using the DMV Case Study and the Stakeholder Analysis Exercise spreadsheet provided, you will complete the three columns of the spreadsheet for each of the ten stakeholder groups listed on the spreadsheet

  Define the first place fund objectives

FIRST PLACE FUND FOR YOUTH- The First Place Fund for Youth is an organization founded in 1998 in Oakland, California, that offers services to youth who are emerging out of the foster care system into independent living. Define the First Place Fund..

  Critique the planning process for the second national bank

What do you think of the idea of having an annual off-site retreat for top management to develop the strategic plan for the organization? Critique the planning process for the Second National Bank

  Case study-training at the newly open changi airport casino

Singapore's newly opened 3rd casino, CAC caters to the needs of travellers, tourists, and thrill-seekers on transit or holiday in Singapore. Situated at Changi Airport and directly connected to all terminals via Sky train, CAC employs around 3,000..

  Describe how well you think starbucks is defending itself

Describe how well you think Starbucks is defending itself against the claims of the IWW. What other responses should the company consider using?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd