Loading...

Messages

Proposals

Stuck in your homework and missing deadline? Get urgent help in $10/Page with 24 hours deadline

Get Urgent Writing Help In Your Essays, Assignments, Homeworks, Dissertation, Thesis Or Coursework & Achieve A+ Grades.

Privacy Guaranteed - 100% Plagiarism Free Writing - Free Turnitin Report - Professional And Experienced Writers - 24/7 Online Support

PKI and Encryption at Work

13/08/2020 Client: joediv12 Deadline: 2 Day

Learning Objectives and Outcomes



  • Develop a plan to deploy public key infrastructure (PKI) and encryption solutions to protect data and information.


Assignment Requirements


In this assignment, you play the role of chief information technology (IT) security officer for the Quality Medical Company (QMC). QMC is a publicly traded company operating in the pharmaceutical industry.


QMC is expanding its arena of work through an increase in the number of clients and products. The senior management of the company is highly concerned about complying with the multitude of legislative and regulatory laws and issues in place. The company has an internal compliance and risk management team to take care of all the compliance-related issues. The company needs to make important decisions about the bulk of resources they will need to meet the voluminous compliance requirements arising from the multidimensional challenge of expansion.


QMC will be required to conform to the following compliance issues:



  • Public-company regulations, such as the Sarbanes-Oxley (SOX) Act

  • Regulations affecting financial companies, companies that make loans and charge interest, such as the U.S. Securities and Exchange Commission (SEC) rules and Gramm-Leach-Bliley Act (GLBA)

  • Regulations affecting healthcare privacy information, such as Health Insurance Portability and Accountability Act (HIPAA)

  • Intellectual Property Law that is important for information asset protection particularly for organizations in the pharmaceutical and technology industry

  • Regulations affecting the privacy of information, including personal identification information, such as personally identifiable information (PII) regularly collected from employees, customers, and end users

  • Corporate governance policies including disclosures to the board of directors and the auditors and the policies related to human resources, governance, harassment, code of conduct, and ethics


Compliance with regulatory requirements implies encrypting sensitive data at rest (DAR) and allowing access to role-holders in the enterprise who require the access. It also implies that sensitive data in motion (DIM) or data that is being communicated via e-mail, instant message (IM), or even Web e-mail must be suitably protected and sent only to the individuals who have a right to view it. The company is conscious about the loss they may face in terms of penalty and brand damage if they fail to abide by the compliance laws, especially in the online information transfer phase. Therefore, as a dedicated employee, your task is to develop a content monitoring strategy using PKI as a potential solution. You will need to determine a process or method to identify multiple data types, processes, and organizational policies. Incorporate them into a plan, and select a PKI solution that will effectively address the content management needs of your company.


You need to present your PKI solution in the form of a professional report to the senior management.


Required Resources


None


Submission Requirements



  • Format: Microsoft Word

  • Font: Arial, 12-Point, Double-Space

  • Citation Style: APA

  • Length: 1–2 pages


Self-Assessment Checklist


Use the following checklist to support your work on the assignment:



  • I have identified specific data types related to the specific compliance regulatory requirements.

  • I have indicated a solution for sharing data beyond the borders of the organization.

  • I have appropriately selected and developed a PKI solution for content control.

  • I have followed the submission requirements.

Homework is Completed By:

Writer Writer Name Amount Client Comments & Rating
Instant Homework Helper

ONLINE

Instant Homework Helper

$36

She helped me in last minute in a very reasonable price. She is a lifesaver, I got A+ grade in my homework, I will surely hire her again for my next assignments, Thumbs Up!

Order & Get This Solution Within 3 Hours in $25/Page

Custom Original Solution And Get A+ Grades

  • 100% Plagiarism Free
  • Proper APA/MLA/Harvard Referencing
  • Delivery in 3 Hours After Placing Order
  • Free Turnitin Report
  • Unlimited Revisions
  • Privacy Guaranteed

Order & Get This Solution Within 6 Hours in $20/Page

Custom Original Solution And Get A+ Grades

  • 100% Plagiarism Free
  • Proper APA/MLA/Harvard Referencing
  • Delivery in 6 Hours After Placing Order
  • Free Turnitin Report
  • Unlimited Revisions
  • Privacy Guaranteed

Order & Get This Solution Within 12 Hours in $15/Page

Custom Original Solution And Get A+ Grades

  • 100% Plagiarism Free
  • Proper APA/MLA/Harvard Referencing
  • Delivery in 12 Hours After Placing Order
  • Free Turnitin Report
  • Unlimited Revisions
  • Privacy Guaranteed

6 writers have sent their proposals to do this homework:

Top Grade Tutor
Writer Writer Name Offer Chat
Top Grade Tutor

ONLINE

Top Grade Tutor

I can provide you with a guarantee of plagiarism free work. I am producing quality content for my clients including ARTICLE WRITING, ESSAY WRITING, RESEARCH PAPERS, BUSINESS PLAN, TECHNICAL WRITING, MATLAB, THESIS & DISSERTATIONS.

$125 Chat With Writer

Let our expert academic writers to help you in achieving a+ grades in your homework, assignment, quiz or exam.

Similar Homework Questions

How to name haloalkanes - Vic police air wing scanner - What gas is produced by the decomposition of hydrogen peroxide - Tcp state machine diagram - Np 31970 0 ps4 error code - China open door policy - International journal of advanced robotic systems impact factor - Exadata x7 2 datasheet - Have fun teaching letter s song - How to use endnote x7 in word - Antisocial Personality Disorder - Ashworth college medical billing and coding final exam - Acting scripts for teens - Mayella and bob ewell relationship - Data center interconnect design - Fixed point scaling in computer graphics - Database design - Cap proj 2 - Edexcel igcse chemistry questions - During a sprint the scrum team works to create ________ - Robin hood analysis - Nitrogen kick off calculation - Finding ph using pkb - Postulates of special theory of relativity ppt - C code style guide - Experiment 1 classification of bones - Difference between strategic operational and tactical planning - HIMA350 Week 5 Assmt - Myob error 13000 - W#14 Health Promotion (Guidelines) - I need 1300 words assignment to demonstrate the role and significance of continuous professional development and its benefits - Harvey amwake cpa - Comfort prefix and suffix - John stossel outsourcing - Alka seltzer reaction equation - Boiler chemical cleaning procedure - Cmi calculation - What is dual discrimination - For anyone - Amadeus business class code - Analysis of Competing Hypothesis - Reynolds intellectual assessment scales iq - Week 1 project - Resources and Capabilities Assessment of Chipotle - Movie rental business case study solution - EDD - Geographical sciences building bristol - Example assessment for teller in at the bank - Maxwell distribution of molecular velocities ppt - Experiential Versus Narrative Family Therapies - Appendices example in report - Week 8 MM - Redarc brake controller manual - Casual use case example - Https symc sam symantec com auth - Project Assignment: Personal Ethic Statement (Integrity and Work Ethics test) - How to create an ecomap - Differentiated Instruction Interview - Oee training material ppt - Project planning 5 - Graphpad prism p value - Conclusion of aldehydes and ketones - Blade and soul climbing to greater heights - Block Chain - Rotational inertia of disk - Nursing and the Aging Family - How do you say the spanish alphabet - What mechanisms produce high precipitation at temperate latitudes - Assignment 4: Information Security Governance - Short essay- Nannie Doss - Melbourne uni term dates 2015 - Al qalaa restaurant london - Neighborhood cellular white settlement texas - The walt disney company the entertainment king case answers - Exam questions - The tasks expected of students which must be evidenced in the submitted group project report - Naughty and nice rutherford trading hours - Telegrams tremble like leaves from a wintering tree - Diary of a worm author - Technical English #3 - 2006 physics exam 2 - Pest control training courses sydney - Workshop - Integrative Intercultural Communication Paper - Unit 2 macroeconomics lesson 3 activity 15 - Master data services add in for excel - Reaction of potassium iodide with silver nitrate - Customer relationship management books free download - Write a select statement that returns three columns - Data nugget gene expression in stem cells quizlet - The outsiders book notes - Zinc plus hydrochloric acid word equation - Computer Science - Dartford science and technology college - Fear of rubber ducks - Is there a fee to enter yellowstone national park - Someone told me long ago - The apostate jack london - Flue gas analysis ppt - Cedaspe oil level indicator