Case Study 2 Public Key Infrastructure*****A++ Rated Tutorial Already***** Use as a Guide Paper*****

Case Study 2: Public Key Infrastructure

Due Week 6 and worth 60 points

Suppose you are the Information Security Director at a small software company. The organization currently utilizes a Microsoft Server 2012 Active Directory domain administered by your information security team. Mostly software developers and a relatively small number of administrative personnel comprise the remainder of the organization. You have convinced business unit leaders that it would be in the best interest of the company to use a public key infrastructure (PKI) in order to provide a framework that fosters confidentiality, integrity, authentication, and nonrepudiation. Email clients, virtual private network (VPN) products, Web server components, and domain controllers would utilize digital certificates issued by the certificate authority (CA). Additionally, the company would use digital certificates to sign software developed by the company in order to demonstrate software authenticity to the customer. 

Write a two to three (2-3) page paper in which you:

  1. Analyze the fundamentals of PKI, and determine the primary ways in which its features and functions could benefit your organization and its information security department.
  2. Propose one (1) way in which the PKI could assist in the process of signing the company’s software, and explain the main reason why a customer could then believe that software to be authentic. 
  3. Compare and contrast public and in-house CAs. Include the positive and negative characteristics of each type of certificate authority, and provide a sound recommendation of and a justification for which you would consider implementing within your organization. Explain your rationale.
  4. Use at least three (3) quality resources in this assignment (no more than 2-3 years old) from material outside the textbook. Note: Wikipedia and similar Websites do not qualify as quality resources.

Your assignment must follow these formatting requirements:

  • Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. Check with your professor for any additional instructions.
  • Include a cover page containing the title of the assignment, the student’s name, the professor’s name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length.

The specific course learning outcomes associated with this assignment are:

  • Explain how businesses apply cryptography in maintaining information security.
  • Use technology and information resources to research issues in information systems security.
  • Write clearly and concisely about network security topics using proper writing mechanics and technical style conventions. 

Answers

Related Questions

Nature Versus Nurture and Behavior U2DB...

 Part 1The style approach (also called behavior theory) asserts that effective leaders behave in certain ways. You can become an effective leader by...

Social emotional development...

 Create and describe structures and activities that support the social-emotional development of preschoolers.Explain how the structures/activities:Su...

Week 9 Discussion...

Please no plagiarism and make sure you are able to access all resource on your own before you bid. I need this completed by 10/25/17 at 6pm. Assessme...

Food and nutrition...

Select at least one or two Food and Nutrition programs to explore such as the Child Adolescent Trial for Cardiovascular Health (CATCH), Gimme 5! Fruit...

introduction to physic...

 a) Greenhouse gases-list major greenhouse gases and their percentage presence in earth atmosphere. List the name(s) of the satellite(s) sent by NA...

Rethinking Psychopathology...

Prior to beginning work on this interactive assignment, review your instructor’s initial forum post, and watch The Nature of the Mind–Part One: Th...

750-1000words book review...

read the book  >and write a short book review, and the document i post is the lecture notes that you can use  What...

Analyze the Role of Community Corrections to Addre...

Instructions: Analyze  the role of community corrections to address the needs of special  populations. When conducting your analysis consider those...

philosophy8...

 Are we consequentialists in our everyday activities?In the following weeks you will begin reading selections from ethical and moral philosophy. To s...

BUS 375 week 4 discussion 2 (Min. 200 words) (DO N...

Required ResourceTextKopp, D. M. (2014). Human resource development: Performance improvement through learning [Electronic version]. Retrieved from htt...

composition II...

* Read Ibsen's play "A Doll's House" on pages 926-980 in our textbook. * Write thorough answers to all of the questions listed below. Be sur...

BUS 375 week 4 discussion 1 (Min. 200 words) (DO N...

Required ResourceTextKopp, D. M. (2014). Human resource development: Performance improvement through learning [Electronic version]. Retrieved from htt...

paper...

   Identify one innovation that has been developed in the past 20 years that has influenced the health care industry, such as:TelemedicineOrgan tra...

writing brief...

 After reading Pevsner’s textbook chapters 3 and 4, briefly (up to ~ 1 page) describe in your own words:   1.  what is BLAST,   2.  what is...

Positive response with reference 150 words due Oct...

As described by Maurer and Smith, vulnerability can be characteristics, traits, or experiences that can increase a persons’ vulnerability to develop...

Positive response to post 150 words with reference...

A group that is “at risk,” will have certain risk factors in place that may potentially put them in a high-risk status such as being overweight, s...

Positive response to post 150 words due October 19...

Suicide is the taking of own life which is a “tragic reaction to stressful life situations (Suicide and suicidal thoughts, 2015).” The national in...

Discussion Board...

Answer must be between 200-250 words. That historical developments are interwoven with the history and mission of the church was never more evident t...

Research in History Part 3...

** You must use the attached - Part 1 & 2 to complete this assignment!!Research in History: Reinforcing Information LiteracyPART 3: Evaluate sources.S...

PLEASE ANSWER 2 PEERS WITH 100 WORDS OR MORE, PLEA...

 Nursing is rated the first when it comes to the medical profession. An advanced practice nurse has the sole duty of providing primary care and preve...

Write a philosophical paper on......

 From our readings over the past few weeks (which i will attach) we've dealt with questions about what is "real", the "realness" of immaterial th...

Principles of Management...

  Assignment Problems (44 points in total):1. List at least 3 advantages and 3 disadvantages of group decision making. (6 points)2. Define groupthin...

Digital Media POWERPOINT SLIDES...

Attached are the requirements for this POWERPOINT PRESENTATION the topic is based off the paragraphs below:Digital media, such as videos, audio clips,...

Discussion Paper...

 Choose a patient-care situation in which the RN should intervene and advocate for the patient.  An example of such a situation might be when a pati...

If you didn't find the right answer

Ask Your Questions, We'll notify you once someone answers it