Ask Question, Ask an Expert

+61-413 786 465

info@mywordsolution.com

Ask Management Information System Expert

Case Study: Public Key Infrastructure

Suppose you are the Information Security Director at a small software company. The organization currently utilizes a Microsoft Server 2012 Active Directory domain administered by your information security team. Mostly software developers and a relatively small number of administrative personnel comprise the remainder of the organization. You have convinced business unit leaders that it would be in the best interest of the company to use a public key infrastructure (PKI) in order to provide a framework that fosters confidentiality, integrity, authentication, and nonrepudiation. Email clients, virtual private network (VPN) products, Web server components, and domain controllers would utilize digital certificates issued by the certificate authority (CA). Additionally, the company would use digital certificates to sign software developed by the company in order to demonstrate software authenticity to the customer.

Write a two to three page paper in which you:

1. Analyze the fundamentals of PKI, and determine the primary ways in which its features and functions could benefit your organization and its information security department.

2. Propose one way in which the PKI could assist in the process of signing the company's software, and explain the main reason why a customer could then believe that software to be authentic.

3. Compare and contrast public and in-house CAs. Include the positive and negative characteristics of each type of certificate authority, and provide a sound recommendation of and a justification for which you would consider implementing within your organization. Explain your rationale.

4. Use at least three quality resources in this assignment (no more than 2-3 years old) from material outside the textbook. Note: Wikipedia and similar Websites do not qualify as quality resources.

Your assignment must follow these formatting requirements:

· Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. Check with your professor for any additional instructions.

· Include a cover page containing the title of the assignment, the student's name, the professor's name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length.

The specific course learning outcomes associated with this assignment are:

· Explain how businesses apply cryptography in maintaining information security.
· Use technology and information resources to research issues in information systems security.
· Write clearly and concisely about network security topics using proper writing mechanics and technical style conventions.

Management Information System, Management Studies

  • Category:- Management Information System
  • Reference No.:- M92183421
  • Price:- $30

Priced at Now at $30, Verified Solution

Have any Question?


Related Questions in Management Information System

Discussion briefly describe three 3 types of errors that

Discussion : Briefly describe three (3) types of errors that can occur in JavaScript. Determine which error you believe to be the most difficult to debug. Provide one (1) example of the error you believe to be the most d ...

Systems analysis design uml version 20 4th edition textbook

Systems Analysis Design UML Version 2.0 4th Edition textbook (Your Turn 8-2) Create a set of discussion points that you will use to explain to your development team the importance of optimizing the design before jumping ...

This assignment answer it in 4-6- page essay make sure you

This assignment; answer it in 4-6- page essay. Make sure you follow the Chicago writing style guide (cover page, page numbering, double space, headings/subheadings, etc). The use of required texts and readings from this ...

Need answers to the below questions 12 - 1 page each

Need Answers to the below Questions (1/2 - 1 page each answer) This is of the assigned textbook "Wharton Managing Emerging Technologies" Q1: Clarify any 2 of the variable evaluation approaches for future markets and emer ...

Question how does a sequential control process differ from

Question : How does a sequential control process differ from a combination control process? Give one example each of a sequential control process and of a combination control process in which a PLC is used.

Hill-rom was transforming from its traditional lines of

Hill-Rom was transforming from its traditional lines of business to a company that was leveraging data to ensure patient safety and satisfaction. 1-How does the HILL-TOM transformation journey change the way the company ...

Answer the following questions 1 how can the internet and

Answer the following Questions : 1.) How can the Internet and ICT (Information Communication Technology) be leveraged to solve the following societal problems (Climate Change, Better Roads and Transportation, Sexism, and ...

Question suppose the daytime processing load consists of 65

Question : Suppose the daytime processing load consists of 65% CPU activity and 35% disk activity. Your customers are complaining that the system is slow. After doing some research, you have learned that you can upgrade ...

Question a boeing 787 dreamliner if you were the program

Question : a) Boeing 787 Dreamliner. If you were the program manager, what would you have done differentlyto avoid the problems faced by the Dreamliner program? b) Enterprise Architecture at American Express. Why was it ...

Assignmentcontinuing with a company you selected in week

Assignment Continuing with a company you selected in Week Two, evaluate network management components on a global scale. Write a 2- to 3-page paper that evaluates and discusses the following: Impacts of Performance Manag ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

Why might a bank avoid the use of interest rate swaps even

Why might a bank avoid the use of interest rate swaps, even when the institution is exposed to significant interest rate

Describe the difference between zero coupon bonds and

Describe the difference between zero coupon bonds and coupon bonds. Under what conditions will a coupon bond sell at a p

Compute the present value of an annuity of 880 per year

Compute the present value of an annuity of $ 880 per year for 16 years, given a discount rate of 6 percent per annum. As

Compute the present value of an 1150 payment made in ten

Compute the present value of an $1,150 payment made in ten years when the discount rate is 12 percent. (Do not round int

Compute the present value of an annuity of 699 per year

Compute the present value of an annuity of $ 699 per year for 19 years, given a discount rate of 6 percent per annum. As