In the previous course, you learned about how security professionals employ cryptography, a system of algorithms that hide data. That system can be unlocked with a key provided to those who have a need to know that data. An important part of cryptography is how to manage these keys to the kingdom. This involves learning and understanding enterprise key management systems and concepts.
Cryptography is the application of algorithms to ensure the confidentiality, integrity, and availability of data while it is at rest, in motion, or in use. Cryptography systems can include local encryptions at the file or disk level, or databases, or they can extend to an enterprise-wide public key infrastructure for whole agencies or corporations.
In this project, you will create both an enterprise key management plan and policy for a company. The length of the plan should be eight to 10 pages double-spaced. The length of this policy should be two to three pages double-spaced. There are seven steps to complete the project. Most steps of this project should take no more than two hours to complete, and the project as a whole should take no more than one week to complete. Begin with the workplace scenario, and then continue to Step 1, “Identify Components of Key Management.”
When you submit your project, your work will be evaluated using the competencies listed below. You can use the list below to self-check your work before submission.
1.1: Organize document or presentation in a manner that promotes understanding and meets the requirements of the assignment.
1.2: Develop coherent paragraphs or points to be internally unified and function as part of the whole document or presentation.
1.3: Provide sufficient, correctly cited support that substantiates the writer’s ideas.
1.4: Tailor communications to the audience.
2.1: Identify and clearly explain the issue, question, problem under consideration.
2.2: Locate and access sufficient information to investigate the issue or problem.
2.3: Evaluate the information in logical manner to determine value and relevance.
2.4: Consider and analyze information in context to the issue or problem.
2.5: Develop well-reasoned ideas, conclusions, checking against relevant criteria.
5.1: Knowledge of procedures, tools, and applications used to keep data or information secure, including public key infrastructure, point-to-point encryption, and smart cards.