Loading...

Messages

Proposals

Stuck in your homework and missing deadline? Get urgent help in $10/Page with 24 hours deadline

Get Urgent Writing Help In Your Essays, Assignments, Homeworks, Dissertation, Thesis Or Coursework & Achieve A+ Grades.

Privacy Guaranteed - 100% Plagiarism Free Writing - Free Turnitin Report - Professional And Experienced Writers - 24/7 Online Support

Enterprise key management plan example

20/10/2021 Client: muhammad11 Deadline: 2 Day

Enterprise Key Management Plan: An Eight- To 10-Page Double-Spaced Word Document With Citations In APA Format Enterprise Key Management Policy: A Two- To Three-Page Double-Spaced Word Document.

Cryptography is the application of algorithms to ensure the confidentiality, integrity, and availability of data, while it is at rest, in motion, or in use. Cryptography systems can include local encryptions at the file or disk level or databases. Cryptography systems can also extend to an enterprise-wide public key infrastructure for whole agencies or corporations.

The following are the deliverables for this project:

Deliverables
Enterprise Key Management Plan: An eight- to 10-page double-spaced Word document with citations in APA format. The page count does not include figures, diagrams, tables, or citations.
Enterprise Key Management Policy: A two- to three-page double-spaced Word document.
Lab Report: A Word document sharing your lab experience along with screenshots.
There are seven steps to complete the project. Most steps of this project should take no more than two hours to complete. The entire project should take no more than one week to complete. Begin with the workplace scenario, and then continue to Step 1, “Identify Components of Key Management.”

When you submit your project, your work will be evaluated using the competencies listed below. You can use the list below to self-check your work before submission.

Step 1: Identify Components of Key Management
Key management will be an important aspect of the new electronic protected health information (e-PHI). Key management is often considered the most difficult part of designing a cryptosystem.

Choose a fictitious or an actual organization. The idea is to provide an overview of the current state of enterprise key management for Superior Health Care.

Review these authentication resources to learn about authentication and the characteristics of key management.

Provide a high-level, top-layer network view (diagram) of the systems in Superior Health Care. The diagram can be a bubble chart or Visio drawing of a simple network diagram with servers. Conduct independent research to identify a suitable network diagram.

Read these resources on data at rest, data in use, and data in motion.

Identify data at rest, data in use, and data in motion as it could apply to your organization. Start by focusing on where data are stored and how data are accessed.

Review these resources on insecure handling, and identify areas where insecure handling may be a concern for your organization.

Incorporate this information in your key management plan.

In the next step, you will consider key management capabilities.

Step 3: Identify Key Management Gaps, Risks, Solutions, and Challenges
In the previous step, you identified the key components of an enterprise key management system. In this step, you will conduct independent research on key management issues in existing organizations. You will use this research to help identify gaps in key management, in each of the key management areas within Superior Health Care.

Conduct independent research to identify typical gaps in key management within organizations. Incorporate and cite actual findings within your key management plan. If unable to find data on real organizations, use authoritative material discussing typical gaps.

Identify crypto attacks and other risks to the cryptographic systems posed by these gaps. Read these resources to brush up on your understanding of crypto attacks.

Propose solutions organizations may use to address these gaps and identify necessary components of these solutions.

Finally, identify challenges, including remedies, other organizations have faced in implementing a key management system.

Include this information in your enterprise key management plan.

Provide a summary table of the information within your key management plan.

Incorporate this information in your implementation plan.

Step 4: Provide Additional Considerations for the CISO
You have satisfactorily identified key management gaps. Incorporate these additional objectives of an enterprise key management system as you compile information for the CISO.

Explain the uses of encryption and the benefits of securing communications by hash functions and other types of encryption. When discussing encryption, be sure to evaluate and assess whether or not to incorporate file encryption, full disc encryption, and partition encryption. Discuss the benefits of using DES, triple DES, or other encryption technologies. To complete this task, review the following resources:
Uses of encryption
Hash functions
types of encryption
DES
triple DES
Describe the use and purpose of hashes and digital signatures in providing message authentication and integrity. Review these resources on authentication to further your understanding. Focus on resources pertaining to message authentication.
Review the resources related to cryptanalysis. Explain the use of cryptography and cryptanalysis in data confidentiality. Cryptanalysts are a very technical and specialized workforce. Your organization already has a workforce of security engineers (SEs). Cryptanalysts could be added to support part of the operation and maintenance functions of the enterprise key management system. Conduct research on the need, cost, and benefits of adding cryptanalysts to the organization’s workforce. Determine if it will be more effective to develop the SEs to perform these tasks. Discuss alternative ways for obtaining cryptanalysis if the organization chooses not to maintain this new skilled community in-house.
Research and explain the concepts and practices commonly used for data confidentiality: the private and public key protocol for authentication, public key infrastructure (PKI), the X.509 cryptography standard, and PKI security. Read about the following cryptography and identity management concepts: public key infrastructure and the X.509 cryptography standard.
Incorporate this information in your implementation plan.

In the next step, you will provide information on different cryptographic systems for the CISO.

Step 5: Analyze Cryptographic Systems
In the previous step, you covered aspects of cryptographic methods. In this step, you will recommend cryptographic systems that your organization should consider procuring. Independently research commercially available enterprise key management system products, discuss at least two systems and recommend a system for Superior Health Care.

Describe the cryptographic system, its effectiveness and efficiencies.

Provide an analysis of the trade-offs of different cryptographic systems.

Review and include information learned from conducting independent research on the following topics:

Security index rating
Level of complexity
Availability or utilization of system resources
Include information on the possible complexity and expense of implementing and operating various cryptographic ciphers. Check out these resources on ciphers to familiarize yourself with the topic.

Incorporate this information in your implementation plan.

In the next step, you will begin final work on the enterprise key management plan.

Step 6: Develop the Enterprise Key Management Plan
In the previous steps, you gathered information about systems used elsewhere. Using the materials produced in those steps, develop your Enterprise Key Management Plan for implementation, operation, and maintenance of the new system. Address these as separate sections in the plan.

In this plan, you will identify the key components, the possible solutions, the risks, and benefits comparisons of each solution, and proposed mitigations to the risks. These, too, should be considered as a separate section or could be integrated within the implementation, operation, and maintenance sections.

A possible outline could be:

Introduction
Purpose
Key Components
Implementation
Operation
Maintenance
Benefits and Risks
Summary/Conclusion
The following are the deliverables for this segment of the project:

Deliverables
Enterprise Key Management Plan: An eight- to 10-page double-spaced Word document with citations in APA format. The page count does not include figures, diagrams, tables, or citations.
Lab Report: A Word document sharing your lab experience along with screenshots.
Submit your plan to the Assignments folder.

After submission, complete the final step of writing the enterprise key management policy.

Step 7: Develop the Enterprise Key Management Policy
The final step in this project requires you to use the information from the previous steps to develop the Enterprise Key Management Policy. The policy governs the processes, procedures, rules of behavior, and training for users and administrators of the enterprise key management system.

Research similar policy documents used by other organizations and adapt an appropriate example to create your policy.

Review and discuss the following within the policy:

digital certificates
certificate authority
certificate revocation lists
Discuss different scenarios and hypothetical situations. For example, the policy could require that when employees leave the company, their digital certificates must be revoked within 24 hours. Another could require that employees must receive initial and annual security training.

Include at least three scenarios and provide policy standards, guidance, and procedures that would be invoked by the enterprise key management policy. Each statement should be short and should define what someone would have to do to comply with the policy.

The following is the deliverable for this segment of the project:

Deliverables
Enterprise Key Management Policy: A two- to three-page double-spaced Word document.

Homework is Completed By:

Writer Writer Name Amount Client Comments & Rating
Instant Homework Helper

ONLINE

Instant Homework Helper

$36

She helped me in last minute in a very reasonable price. She is a lifesaver, I got A+ grade in my homework, I will surely hire her again for my next assignments, Thumbs Up!

Order & Get This Solution Within 3 Hours in $25/Page

Custom Original Solution And Get A+ Grades

  • 100% Plagiarism Free
  • Proper APA/MLA/Harvard Referencing
  • Delivery in 3 Hours After Placing Order
  • Free Turnitin Report
  • Unlimited Revisions
  • Privacy Guaranteed

Order & Get This Solution Within 6 Hours in $20/Page

Custom Original Solution And Get A+ Grades

  • 100% Plagiarism Free
  • Proper APA/MLA/Harvard Referencing
  • Delivery in 6 Hours After Placing Order
  • Free Turnitin Report
  • Unlimited Revisions
  • Privacy Guaranteed

Order & Get This Solution Within 12 Hours in $15/Page

Custom Original Solution And Get A+ Grades

  • 100% Plagiarism Free
  • Proper APA/MLA/Harvard Referencing
  • Delivery in 12 Hours After Placing Order
  • Free Turnitin Report
  • Unlimited Revisions
  • Privacy Guaranteed

6 writers have sent their proposals to do this homework:

Fatimah Syeda
Top Rated Expert
Buy Coursework Help
Accounting & Finance Specialist
Coursework Assignment Help
Assignment Hub
Writer Writer Name Offer Chat
Fatimah Syeda

ONLINE

Fatimah Syeda

I will provide you with the well organized and well research papers from different primary and secondary sources will write the content that will support your points.

$48 Chat With Writer
Top Rated Expert

ONLINE

Top Rated Expert

I will be delighted to work on your project. As an experienced writer, I can provide you top quality, well researched, concise and error-free work within your provided deadline at very reasonable prices.

$16 Chat With Writer
Buy Coursework Help

ONLINE

Buy Coursework Help

I reckon that I can perfectly carry this project for you! I am a research writer and have been writing academic papers, business reports, plans, literature review, reports and others for the past 1 decade.

$18 Chat With Writer
Accounting & Finance Specialist

ONLINE

Accounting & Finance Specialist

I have written research reports, assignments, thesis, research proposals, and dissertations for different level students and on different subjects.

$47 Chat With Writer
Coursework Assignment Help

ONLINE

Coursework Assignment Help

As an experienced writer, I have extensive experience in business writing, report writing, business profile writing, writing business reports and business plans for my clients.

$22 Chat With Writer
Assignment Hub

ONLINE

Assignment Hub

I am an experienced researcher here with master education. After reading your posting, I feel, you need an expert research writer to complete your project.Thank You

$38 Chat With Writer

Let our expert academic writers to help you in achieving a+ grades in your homework, assignment, quiz or exam.

Similar Homework Questions

Animals should not be kept in cages persuasive text - Chielo things fall apart - Critical Reflection Essays - Why is being organised important - Operational Excellence(Dis1) - Intermediate accounting chapter 23 statement of cash flows solutions - Are t bill rates annualized - Wgu c229 social media campaign - Qnt 351 quantitative analysis for business - Dcs sanitation - Select and evaluate the usefulness of a range of decision-making tools and reflect on your decision-making styles and contrast with other styles to determine the respective levels of rationality and intuition utilised - Rsa remote access token - Econ - Analytical chemistry instruments - Hill and jones strategic management 10th edition ppt - Warren and brown valve refacer 212 - What does a burning cross mean - Unit 8 mobile apps development assignment - Naeyc standard 1 promoting child development and learning - I choose to worship chords wess morgan - Dan murphy wolf blass eaglehawk - Nunthorpe academy staff email - Bbc digital media initiative revisited case study - Cloud computing - ???)+2349022657119.^_________^ I WANT TO JOIN OCCUT FOR ..WEALTH AND POWER ..$ VOODOO SPELL..RITUAL 666. - Travis perkins water container - How do you think others perceive you essay - Https www learner org courses envsci interactives demographics - Annotated bibliography on death penalty - Throughout this course, you have kept journal entries each week - Qut withdrawal without penalty - Eco 365 week 1 assignment - Which company has the least efficient sg&a/sales ratio? - Essay edit work - Review the currency pair charts for the barbadian dollar - Should self driving cars replace human drivers argument essay - The template of templates they say i say - Valence electrons for each group - PowerPoint presentation on depression / scholarly resources from 2015/ no plagiarism - Who wrote empire of the summer moon - 2012 nfpa 99 power strip requirements - West coast outdoor advertisers sam project - Healthcare Informatics Leader's Workflow Analysis for Master's degree program - Roles of a social worker - Caloric content of food labpaq answers - The giver assignments pdf - Integrated marketing communications examples red bull - 150 word ,1 or 2 pages - Possible conflict management and negotiation techniques - I had a nice time with you tonight. on the app - Rostan line dancing canberra - Difference between word addressable and byte addressable - Retained earnings are occasionally restricted - OE - Homework - 1 & 2 - Ross lovegrove lava lamp - Linear programming case study examples - Complex ions and solubility - Sir charles gairdner hospital visiting hours - The golden kite the silver wind cause and effect chart - New belgium brewing ethical and environmental responsibility case study - Only connect em forster - They say i say chapter 5 pdf - Online discussion bhar - Everyday sociology gcu - Human karyotype from carolina biological supply company answers - Randall parker foods halal - Structural steel inspection forms - I need a 2200 words on 2 article SEO in which each article 1100 words - Discussion question - Monte carlo simulation in capital budgeting - How jews became white folk - Electric field mapping lab report - How to install adobe muse - The retail inventory method is characterized by - Royal marsden chelsea parking - Please see the attchment(APPLICATION SECURITY). - Electron configuration of fe+2 - An instructor has given a short - Driving miss daisy discussion questions - Brondecon cough mixture australia - Ridge racer ds rom - Nursing - Polesworth school term dates - Exam 2 - Blood typing internet activity - The operating cycle of a merchandising company - 882 beams road bridgeman downs - Comprehensive problem 1 - Schrodinger equation copy paste - Middle road media case study - Convert tons to barrels of crude oil - Chapter 10 scarlet letter quotes - X2 2x 15 0 quadratic formula - Psychology Infographic - From fly girls to bitches and hos - Kangaroo island ferry prices - Ghost mountain riders hells angels - 10 100 police code - Personal Nursing Philosophy Paper - Cec installation and commissioning checklist