SlideShare a Scribd company logo
1 of 7
Case Study 2: Public Key Infrastructure
Suppose you are the Information Security Director at a small
software company. The organization currently utilizes a
Microsoft Server 2012 Active Directory domain administered by
your information security team. Mostly software developers and
a relatively small number of administrative personnel comprise
the remainder of the organization. You have convinced business
unit leaders that it would be in the best interest of the company
to use a public key infrastructure (PKI) in order to provide a
framework that fosters confidentiality, integrity, authentication,
and nonrepudiation. Email clients, virtual private network
(VPN) products, Web server components, and domain
controllers would utilize digital certificates issued by the
certificate authority (CA). Additionally, the company would use
digital certificates to sign software developed by the company
in order to demonstrate software authenticity to the customer.
Write a two to three (2-3) page paper in which you:
1.
Analyze the fundamentals of PKI, and determine the primary
ways in which its features and functions could benefit your
organization and its information security department.
2.
Propose one (1) way in which the PKI could assist in the
process of signing the company’s software, and explain the
main reason why a customer could then believe that software to
be authentic.
3.
Compare and contrast public and in-house CAs. Include the
positive and negative characteristics of each type of certificate
authority, and provide a sound recommendation of and a
justification for which you would consider implementing within
your organization. Explain your rationale.
4.
Use at least three (3) quality resources in this assignment (no
more than 2-3 years old) from material outside the textbook.
Note: Wikipedia and similar Websites do not qualify as quality
resources.
Your assignment must follow these formatting requirements:
·
Be typed, double spaced, using Times New Roman font (size
12), with one-inch margins on all sides; citations and references
must follow APA or school-specific format. Check with your
professor for any additional instructions.
·
Include a cover page containing the title of the assignment, the
student’s name, the professor’s name, the course title, and the
date. The cover page and the reference page are not included in
the required assignment page length.
The specific course learning outcomes associated with this
assignment are:
·
Explain how businesses apply cryptography in maintaining
information security.
·
Use technology and information resources to research issues in
information systems security.
·
Write clearly and concisely about network security topics using
proper writing mechanics and technical style conventions
Case Study 2: Public Key Infrastructure
Criteria
Unacceptable
Below 60% F
Meets Minimum Expectations
60-69% D
Fair
70-79% C
Proficient
80-89% B
Exemplary
90-100% A
1.
Analyze the fundamentals of PKI, and determine the primary
ways in which its features and functions could benefit your
organization and its information security department.
Weight: 30%
Did not submit or incompletely analyzed
the fundamentals of PKI; did not submit or incompletely
determined the primary ways in which its features and functions
could benefit your organization and its information security
department.
Insufficiently analyzed
the fundamentals of PKI; insufficiently determined the primary
ways in which its features and functions could benefit your
organization and its information security department.
Partially analyzed
the fundamentals of PKI; partially determined the primary ways
in which its features and functions could benefit your
organization and its information security department.
Satisfactorily analyzed
the fundamentals of PKI; satisfactorily determined the primary
ways in which its features and functions could benefit your
organization and its information security department.
Thoroughly analyzed
the fundamentals of PKI; thoroughly determined the primary
ways in which its features and functions could benefit your
organization and its information security department.
2.
Propose one (1) way in which the PKI could assist in the
process of signing the company’s software, and explain the
main reason why a customer could then believe that software to
be authentic.
Weight: 25%
Did not submit or incompletely proposed
one (1) way in which the PKI could assist in the process of
signing the company’s software; did not submit or incompletely
explained the main reason why a customer could then believe
that software to be authentic.
Insufficiently proposed
one (1) way in which the PKI could assist in the process of
signing the company’s software; insufficiently explained the
main reason why a customer could then believe that software to
be authentic.
Partially proposed
one (1) way in which the PKI could assist in the process of
signing the company’s software; partially explained the main
reason why a customer could then believe that software to be
authentic.
Satisfactorily proposed
one (1) way in which the PKI could assist in the process of
signing the company’s software; satisfactorily explained the
main reason why a customer could then believe that software to
be authentic.
Thoroughly proposed
one (1) way in which the PKI could assist in the process of
signing the company’s software; thoroughly explained the main
reason why a customer could then believe that software to be
authentic.
3.
Compare and contrast public and in-house CAs. Include the
positive and negative characteristics of each type of certificate
authority, and provide a sound recommendation of and a
justification for which you would consider implementing within
your organization. Explain your rationale.
Weight: 30%
Did not submit or incompletely compared and contrastedpublic
and in-house CAs. Did not submit or incompletely included the
positive and negative characteristics of each type of certificate
authority; did not submit or incompletely provided a sound
recommendation of and a justification for which you would
consider implementing within your organization. Did not submit
or incompletely explained your rationale.
Insufficiently compared and contrastedpublic and in-house
CAs.Insufficientlyincluded the positive and negative
characteristics of each type of certificate authority;
insufficiently provided a sound recommendation of and a
justification for which you would consider implementing within
your organization.Insufficientlyexplained your rationale.
Partially compared and contrastedpublic and in-house
CAs.Partiallyincluded the positive and negative characteristics
of each type of certificate authority; partially provided a sound
recommendation of and a justification for which you would
consider implementing within your
organization.Partiallyexplained your rationale.
Satisfactorily compared and contrastedpublic and in-house
CAs.Satisfactorilyincluded the positive and negative
characteristics of each type of certificate authority;
satisfactorily provided a sound recommendation of and a
justification for which you would consider implementing within
your organization.Satisfactorilyexplained your rationale.
Thoroughly compared and contrastedpublic and in-house
CAs.Thoroughlyincluded the positive and negative
characteristics of each type of certificate authority; thoroughly
provided a sound recommendation of and a justification for
which you would consider implementing within your
organization.Thoroughlyexplained your rationale.
4. 3 references
Weight: 5%
No references provided
Does not meet the required number of references; all references
poor quality choices.
Does not meet the required number of references; some
references poor quality choices.
Meets number of required references; all references high quality
choices.
Exceeds number of required references; all references high
quality choices.
5. Clarity, writing mechanics, and formatting requirements
Weight: 10%
More than 8 errors present
7-8 errors present
5-6 errors present
3-4 errors present
0-2 errors present
Case Study 2 Public Key InfrastructureSuppose you are the Infor.docx

More Related Content

Similar to Case Study 2 Public Key InfrastructureSuppose you are the Infor.docx

Note Chapter 5 of the required textbook may be helpful in the com.docx
Note Chapter 5 of the required textbook may be helpful in the com.docxNote Chapter 5 of the required textbook may be helpful in the com.docx
Note Chapter 5 of the required textbook may be helpful in the com.docxIlonaThornburg83
 
CMIT 321 EXECUTIVE PROPOSAL PROJECT
CMIT 321 EXECUTIVE PROPOSAL PROJECTCMIT 321 EXECUTIVE PROPOSAL PROJECT
CMIT 321 EXECUTIVE PROPOSAL PROJECTHamesKellor
 
The security consulting firm that you work for has been awarded a co.docx
The security consulting firm that you work for has been awarded a co.docxThe security consulting firm that you work for has been awarded a co.docx
The security consulting firm that you work for has been awarded a co.docxjoshua2345678
 
Assignment 1 Business Security PostureDue Week 3 and worth 90 poi.docx
Assignment 1 Business Security PostureDue Week 3 and worth 90 poi.docxAssignment 1 Business Security PostureDue Week 3 and worth 90 poi.docx
Assignment 1 Business Security PostureDue Week 3 and worth 90 poi.docxmurgatroydcrista
 
Term Paper The Rookie Chief Information Security OfficerD
Term Paper The Rookie Chief Information Security OfficerDTerm Paper The Rookie Chief Information Security OfficerD
Term Paper The Rookie Chief Information Security OfficerDalehosickg3
 
The Rookie Chief Information Security OfficerWorth 200 poi
The Rookie Chief Information Security OfficerWorth 200 poiThe Rookie Chief Information Security OfficerWorth 200 poi
The Rookie Chief Information Security OfficerWorth 200 poijacvzpline
 
Points 200 Term Paper The Rookie Chief Information Security .docx
Points 200 Term Paper The Rookie Chief Information Security .docxPoints 200 Term Paper The Rookie Chief Information Security .docx
Points 200 Term Paper The Rookie Chief Information Security .docxLeilaniPoolsy
 
Case Study 1 Mitigating Cloud Computing RisksDue Week 4 and wor
Case Study 1 Mitigating Cloud Computing RisksDue Week 4 and worCase Study 1 Mitigating Cloud Computing RisksDue Week 4 and wor
Case Study 1 Mitigating Cloud Computing RisksDue Week 4 and worogglili
 
Cryptography is the application of algorithms to ensure the confiden.docx
Cryptography is the application of algorithms to ensure the confiden.docxCryptography is the application of algorithms to ensure the confiden.docx
Cryptography is the application of algorithms to ensure the confiden.docxmydrynan
 
The Rookie Chief Information Security OfficerThis assignment consi.docx
The Rookie Chief Information Security OfficerThis assignment consi.docxThe Rookie Chief Information Security OfficerThis assignment consi.docx
The Rookie Chief Information Security OfficerThis assignment consi.docxKomlin1
 
Cis 542 week 7 assignment 2
Cis 542 week 7 assignment 2Cis 542 week 7 assignment 2
Cis 542 week 7 assignment 2hwacer123
 
CMIT 321 Executive Proposal ProjectThe purpose of this project i.docx
CMIT 321 Executive Proposal ProjectThe purpose of this project i.docxCMIT 321 Executive Proposal ProjectThe purpose of this project i.docx
CMIT 321 Executive Proposal ProjectThe purpose of this project i.docxclarebernice
 
Improving our Approach Towards Capturing Value in Requirements
Improving our Approach Towards Capturing Value in RequirementsImproving our Approach Towards Capturing Value in Requirements
Improving our Approach Towards Capturing Value in RequirementsOsama M. Khaled
 
Using the power of OpenAI with your own data: what's possible and how to start?
Using the power of OpenAI with your own data: what's possible and how to start?Using the power of OpenAI with your own data: what's possible and how to start?
Using the power of OpenAI with your own data: what's possible and how to start?Maxim Salnikov
 
Strayer cis 349 week 10 term paper planning an it infrastructure audit for co...
Strayer cis 349 week 10 term paper planning an it infrastructure audit for co...Strayer cis 349 week 10 term paper planning an it infrastructure audit for co...
Strayer cis 349 week 10 term paper planning an it infrastructure audit for co...shyaminfo30
 
JUS 455 Final Project Milestone Two Guidelines and Rubric
 JUS 455 Final Project Milestone Two Guidelines and Rubric   JUS 455 Final Project Milestone Two Guidelines and Rubric
JUS 455 Final Project Milestone Two Guidelines and Rubric MoseStaton39
 
The Rookie Chief Information Security OfficerDue Week 10 and w.docx
The Rookie Chief Information Security OfficerDue Week 10 and w.docxThe Rookie Chief Information Security OfficerDue Week 10 and w.docx
The Rookie Chief Information Security OfficerDue Week 10 and w.docxteresehearn
 

Similar to Case Study 2 Public Key InfrastructureSuppose you are the Infor.docx (17)

Note Chapter 5 of the required textbook may be helpful in the com.docx
Note Chapter 5 of the required textbook may be helpful in the com.docxNote Chapter 5 of the required textbook may be helpful in the com.docx
Note Chapter 5 of the required textbook may be helpful in the com.docx
 
CMIT 321 EXECUTIVE PROPOSAL PROJECT
CMIT 321 EXECUTIVE PROPOSAL PROJECTCMIT 321 EXECUTIVE PROPOSAL PROJECT
CMIT 321 EXECUTIVE PROPOSAL PROJECT
 
The security consulting firm that you work for has been awarded a co.docx
The security consulting firm that you work for has been awarded a co.docxThe security consulting firm that you work for has been awarded a co.docx
The security consulting firm that you work for has been awarded a co.docx
 
Assignment 1 Business Security PostureDue Week 3 and worth 90 poi.docx
Assignment 1 Business Security PostureDue Week 3 and worth 90 poi.docxAssignment 1 Business Security PostureDue Week 3 and worth 90 poi.docx
Assignment 1 Business Security PostureDue Week 3 and worth 90 poi.docx
 
Term Paper The Rookie Chief Information Security OfficerD
Term Paper The Rookie Chief Information Security OfficerDTerm Paper The Rookie Chief Information Security OfficerD
Term Paper The Rookie Chief Information Security OfficerD
 
The Rookie Chief Information Security OfficerWorth 200 poi
The Rookie Chief Information Security OfficerWorth 200 poiThe Rookie Chief Information Security OfficerWorth 200 poi
The Rookie Chief Information Security OfficerWorth 200 poi
 
Points 200 Term Paper The Rookie Chief Information Security .docx
Points 200 Term Paper The Rookie Chief Information Security .docxPoints 200 Term Paper The Rookie Chief Information Security .docx
Points 200 Term Paper The Rookie Chief Information Security .docx
 
Case Study 1 Mitigating Cloud Computing RisksDue Week 4 and wor
Case Study 1 Mitigating Cloud Computing RisksDue Week 4 and worCase Study 1 Mitigating Cloud Computing RisksDue Week 4 and wor
Case Study 1 Mitigating Cloud Computing RisksDue Week 4 and wor
 
Cryptography is the application of algorithms to ensure the confiden.docx
Cryptography is the application of algorithms to ensure the confiden.docxCryptography is the application of algorithms to ensure the confiden.docx
Cryptography is the application of algorithms to ensure the confiden.docx
 
The Rookie Chief Information Security OfficerThis assignment consi.docx
The Rookie Chief Information Security OfficerThis assignment consi.docxThe Rookie Chief Information Security OfficerThis assignment consi.docx
The Rookie Chief Information Security OfficerThis assignment consi.docx
 
Cis 542 week 7 assignment 2
Cis 542 week 7 assignment 2Cis 542 week 7 assignment 2
Cis 542 week 7 assignment 2
 
CMIT 321 Executive Proposal ProjectThe purpose of this project i.docx
CMIT 321 Executive Proposal ProjectThe purpose of this project i.docxCMIT 321 Executive Proposal ProjectThe purpose of this project i.docx
CMIT 321 Executive Proposal ProjectThe purpose of this project i.docx
 
Improving our Approach Towards Capturing Value in Requirements
Improving our Approach Towards Capturing Value in RequirementsImproving our Approach Towards Capturing Value in Requirements
Improving our Approach Towards Capturing Value in Requirements
 
Using the power of OpenAI with your own data: what's possible and how to start?
Using the power of OpenAI with your own data: what's possible and how to start?Using the power of OpenAI with your own data: what's possible and how to start?
Using the power of OpenAI with your own data: what's possible and how to start?
 
Strayer cis 349 week 10 term paper planning an it infrastructure audit for co...
Strayer cis 349 week 10 term paper planning an it infrastructure audit for co...Strayer cis 349 week 10 term paper planning an it infrastructure audit for co...
Strayer cis 349 week 10 term paper planning an it infrastructure audit for co...
 
JUS 455 Final Project Milestone Two Guidelines and Rubric
 JUS 455 Final Project Milestone Two Guidelines and Rubric   JUS 455 Final Project Milestone Two Guidelines and Rubric
JUS 455 Final Project Milestone Two Guidelines and Rubric
 
The Rookie Chief Information Security OfficerDue Week 10 and w.docx
The Rookie Chief Information Security OfficerDue Week 10 and w.docxThe Rookie Chief Information Security OfficerDue Week 10 and w.docx
The Rookie Chief Information Security OfficerDue Week 10 and w.docx
 

More from michelljubborjudd

Please respond to the followingSummarize the information from.docx
Please respond to the followingSummarize the information from.docxPlease respond to the followingSummarize the information from.docx
Please respond to the followingSummarize the information from.docxmichelljubborjudd
 
Chapter 10 1 & 161. Transaction versus Economic Exposure Comp.docx
Chapter 10 1 & 161. Transaction versus Economic Exposure Comp.docxChapter 10 1 & 161. Transaction versus Economic Exposure Comp.docx
Chapter 10 1 & 161. Transaction versus Economic Exposure Comp.docxmichelljubborjudd
 
Chapter 10, global risks will continue to occur. Table 10.3.docx
Chapter 10, global risks will continue to occur. Table 10.3.docxChapter 10, global risks will continue to occur. Table 10.3.docx
Chapter 10, global risks will continue to occur. Table 10.3.docxmichelljubborjudd
 
Chapter 1 of the text highlights the nine properties of life. Briefl.docx
Chapter 1 of the text highlights the nine properties of life. Briefl.docxChapter 1 of the text highlights the nine properties of life. Briefl.docx
Chapter 1 of the text highlights the nine properties of life. Briefl.docxmichelljubborjudd
 
Changing the culture of the organization can be one of the tough.docx
Changing the culture of the organization can be one of the tough.docxChanging the culture of the organization can be one of the tough.docx
Changing the culture of the organization can be one of the tough.docxmichelljubborjudd
 
Change View Max Points 10.0Organizations can avoid investing .docx
Change View Max Points 10.0Organizations can avoid investing .docxChange View Max Points 10.0Organizations can avoid investing .docx
Change View Max Points 10.0Organizations can avoid investing .docxmichelljubborjudd
 
Change management plans define the process for identifying, approvin.docx
Change management plans define the process for identifying, approvin.docxChange management plans define the process for identifying, approvin.docx
Change management plans define the process for identifying, approvin.docxmichelljubborjudd
 
Change Control Management  Please respond to the followingAs ex.docx
Change Control Management  Please respond to the followingAs ex.docxChange Control Management  Please respond to the followingAs ex.docx
Change Control Management  Please respond to the followingAs ex.docxmichelljubborjudd
 
Chamberlain College of NursingNR451RN Capstone CourseCapsto.docx
Chamberlain College of NursingNR451RN Capstone CourseCapsto.docxChamberlain College of NursingNR451RN Capstone CourseCapsto.docx
Chamberlain College of NursingNR451RN Capstone CourseCapsto.docxmichelljubborjudd
 
Change and Personal Reflection  Please respond to the following.docx
Change and Personal Reflection  Please respond to the following.docxChange and Personal Reflection  Please respond to the following.docx
Change and Personal Reflection  Please respond to the following.docxmichelljubborjudd
 
CH 1-11 do not plagiarize! Take a moment to reflect on what you .docx
CH 1-11 do not plagiarize! Take a moment to reflect on what you .docxCH 1-11 do not plagiarize! Take a moment to reflect on what you .docx
CH 1-11 do not plagiarize! Take a moment to reflect on what you .docxmichelljubborjudd
 
Chambliss discusses the efforts to revitalize the economically distr.docx
Chambliss discusses the efforts to revitalize the economically distr.docxChambliss discusses the efforts to revitalize the economically distr.docx
Chambliss discusses the efforts to revitalize the economically distr.docxmichelljubborjudd
 
Certified medical administrative assistants (CMAAs) need to be aware.docx
Certified medical administrative assistants (CMAAs) need to be aware.docxCertified medical administrative assistants (CMAAs) need to be aware.docx
Certified medical administrative assistants (CMAAs) need to be aware.docxmichelljubborjudd
 
Chapter 1 (The Expansion of Criminological Theory)1. Compare and con.docx
Chapter 1 (The Expansion of Criminological Theory)1. Compare and con.docxChapter 1 (The Expansion of Criminological Theory)1. Compare and con.docx
Chapter 1 (The Expansion of Criminological Theory)1. Compare and con.docxmichelljubborjudd
 
Challenges in Rebuilding and ReconstructionA small community is de.docx
Challenges in Rebuilding and ReconstructionA small community is de.docxChallenges in Rebuilding and ReconstructionA small community is de.docx
Challenges in Rebuilding and ReconstructionA small community is de.docxmichelljubborjudd
 
Catherine OwensRead the incident scenario, and write a response th.docx
Catherine OwensRead the incident scenario, and write a response th.docxCatherine OwensRead the incident scenario, and write a response th.docx
Catherine OwensRead the incident scenario, and write a response th.docxmichelljubborjudd
 
Ceate a 2- to 3-page document in Microsoft Word for providing answer.docx
Ceate a 2- to 3-page document in Microsoft Word for providing answer.docxCeate a 2- to 3-page document in Microsoft Word for providing answer.docx
Ceate a 2- to 3-page document in Microsoft Word for providing answer.docxmichelljubborjudd
 
cenario Additional DetailsAs the system administrator, you are al.docx
cenario Additional DetailsAs the system administrator, you are al.docxcenario Additional DetailsAs the system administrator, you are al.docx
cenario Additional DetailsAs the system administrator, you are al.docxmichelljubborjudd
 
CDHPsA new type of third-party-reimbursement healthcare payment pl.docx
CDHPsA new type of third-party-reimbursement healthcare payment pl.docxCDHPsA new type of third-party-reimbursement healthcare payment pl.docx
CDHPsA new type of third-party-reimbursement healthcare payment pl.docxmichelljubborjudd
 
CC is a previously healthy 27-year-old man admitted to the critical .docx
CC is a previously healthy 27-year-old man admitted to the critical .docxCC is a previously healthy 27-year-old man admitted to the critical .docx
CC is a previously healthy 27-year-old man admitted to the critical .docxmichelljubborjudd
 

More from michelljubborjudd (20)

Please respond to the followingSummarize the information from.docx
Please respond to the followingSummarize the information from.docxPlease respond to the followingSummarize the information from.docx
Please respond to the followingSummarize the information from.docx
 
Chapter 10 1 & 161. Transaction versus Economic Exposure Comp.docx
Chapter 10 1 & 161. Transaction versus Economic Exposure Comp.docxChapter 10 1 & 161. Transaction versus Economic Exposure Comp.docx
Chapter 10 1 & 161. Transaction versus Economic Exposure Comp.docx
 
Chapter 10, global risks will continue to occur. Table 10.3.docx
Chapter 10, global risks will continue to occur. Table 10.3.docxChapter 10, global risks will continue to occur. Table 10.3.docx
Chapter 10, global risks will continue to occur. Table 10.3.docx
 
Chapter 1 of the text highlights the nine properties of life. Briefl.docx
Chapter 1 of the text highlights the nine properties of life. Briefl.docxChapter 1 of the text highlights the nine properties of life. Briefl.docx
Chapter 1 of the text highlights the nine properties of life. Briefl.docx
 
Changing the culture of the organization can be one of the tough.docx
Changing the culture of the organization can be one of the tough.docxChanging the culture of the organization can be one of the tough.docx
Changing the culture of the organization can be one of the tough.docx
 
Change View Max Points 10.0Organizations can avoid investing .docx
Change View Max Points 10.0Organizations can avoid investing .docxChange View Max Points 10.0Organizations can avoid investing .docx
Change View Max Points 10.0Organizations can avoid investing .docx
 
Change management plans define the process for identifying, approvin.docx
Change management plans define the process for identifying, approvin.docxChange management plans define the process for identifying, approvin.docx
Change management plans define the process for identifying, approvin.docx
 
Change Control Management  Please respond to the followingAs ex.docx
Change Control Management  Please respond to the followingAs ex.docxChange Control Management  Please respond to the followingAs ex.docx
Change Control Management  Please respond to the followingAs ex.docx
 
Chamberlain College of NursingNR451RN Capstone CourseCapsto.docx
Chamberlain College of NursingNR451RN Capstone CourseCapsto.docxChamberlain College of NursingNR451RN Capstone CourseCapsto.docx
Chamberlain College of NursingNR451RN Capstone CourseCapsto.docx
 
Change and Personal Reflection  Please respond to the following.docx
Change and Personal Reflection  Please respond to the following.docxChange and Personal Reflection  Please respond to the following.docx
Change and Personal Reflection  Please respond to the following.docx
 
CH 1-11 do not plagiarize! Take a moment to reflect on what you .docx
CH 1-11 do not plagiarize! Take a moment to reflect on what you .docxCH 1-11 do not plagiarize! Take a moment to reflect on what you .docx
CH 1-11 do not plagiarize! Take a moment to reflect on what you .docx
 
Chambliss discusses the efforts to revitalize the economically distr.docx
Chambliss discusses the efforts to revitalize the economically distr.docxChambliss discusses the efforts to revitalize the economically distr.docx
Chambliss discusses the efforts to revitalize the economically distr.docx
 
Certified medical administrative assistants (CMAAs) need to be aware.docx
Certified medical administrative assistants (CMAAs) need to be aware.docxCertified medical administrative assistants (CMAAs) need to be aware.docx
Certified medical administrative assistants (CMAAs) need to be aware.docx
 
Chapter 1 (The Expansion of Criminological Theory)1. Compare and con.docx
Chapter 1 (The Expansion of Criminological Theory)1. Compare and con.docxChapter 1 (The Expansion of Criminological Theory)1. Compare and con.docx
Chapter 1 (The Expansion of Criminological Theory)1. Compare and con.docx
 
Challenges in Rebuilding and ReconstructionA small community is de.docx
Challenges in Rebuilding and ReconstructionA small community is de.docxChallenges in Rebuilding and ReconstructionA small community is de.docx
Challenges in Rebuilding and ReconstructionA small community is de.docx
 
Catherine OwensRead the incident scenario, and write a response th.docx
Catherine OwensRead the incident scenario, and write a response th.docxCatherine OwensRead the incident scenario, and write a response th.docx
Catherine OwensRead the incident scenario, and write a response th.docx
 
Ceate a 2- to 3-page document in Microsoft Word for providing answer.docx
Ceate a 2- to 3-page document in Microsoft Word for providing answer.docxCeate a 2- to 3-page document in Microsoft Word for providing answer.docx
Ceate a 2- to 3-page document in Microsoft Word for providing answer.docx
 
cenario Additional DetailsAs the system administrator, you are al.docx
cenario Additional DetailsAs the system administrator, you are al.docxcenario Additional DetailsAs the system administrator, you are al.docx
cenario Additional DetailsAs the system administrator, you are al.docx
 
CDHPsA new type of third-party-reimbursement healthcare payment pl.docx
CDHPsA new type of third-party-reimbursement healthcare payment pl.docxCDHPsA new type of third-party-reimbursement healthcare payment pl.docx
CDHPsA new type of third-party-reimbursement healthcare payment pl.docx
 
CC is a previously healthy 27-year-old man admitted to the critical .docx
CC is a previously healthy 27-year-old man admitted to the critical .docxCC is a previously healthy 27-year-old man admitted to the critical .docx
CC is a previously healthy 27-year-old man admitted to the critical .docx
 

Recently uploaded

Spellings Wk 4 and Wk 5 for Grade 4 at CAPS
Spellings Wk 4 and Wk 5 for Grade 4 at CAPSSpellings Wk 4 and Wk 5 for Grade 4 at CAPS
Spellings Wk 4 and Wk 5 for Grade 4 at CAPSAnaAcapella
 
會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽
會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽
會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽中 央社
 
Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...
Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...
Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...EADTU
 
The Story of Village Palampur Class 9 Free Study Material PDF
The Story of Village Palampur Class 9 Free Study Material PDFThe Story of Village Palampur Class 9 Free Study Material PDF
The Story of Village Palampur Class 9 Free Study Material PDFVivekanand Anglo Vedic Academy
 
Graduate Outcomes Presentation Slides - English (v3).pptx
Graduate Outcomes Presentation Slides - English (v3).pptxGraduate Outcomes Presentation Slides - English (v3).pptx
Graduate Outcomes Presentation Slides - English (v3).pptxneillewis46
 
會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文
會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文
會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文中 央社
 
ĐỀ THAM KHẢO KÌ THI TUYỂN SINH VÀO LỚP 10 MÔN TIẾNG ANH FORM 50 CÂU TRẮC NGHI...
ĐỀ THAM KHẢO KÌ THI TUYỂN SINH VÀO LỚP 10 MÔN TIẾNG ANH FORM 50 CÂU TRẮC NGHI...ĐỀ THAM KHẢO KÌ THI TUYỂN SINH VÀO LỚP 10 MÔN TIẾNG ANH FORM 50 CÂU TRẮC NGHI...
ĐỀ THAM KHẢO KÌ THI TUYỂN SINH VÀO LỚP 10 MÔN TIẾNG ANH FORM 50 CÂU TRẮC NGHI...Nguyen Thanh Tu Collection
 
24 ĐỀ THAM KHẢO KÌ THI TUYỂN SINH VÀO LỚP 10 MÔN TIẾNG ANH SỞ GIÁO DỤC HẢI DƯ...
24 ĐỀ THAM KHẢO KÌ THI TUYỂN SINH VÀO LỚP 10 MÔN TIẾNG ANH SỞ GIÁO DỤC HẢI DƯ...24 ĐỀ THAM KHẢO KÌ THI TUYỂN SINH VÀO LỚP 10 MÔN TIẾNG ANH SỞ GIÁO DỤC HẢI DƯ...
24 ĐỀ THAM KHẢO KÌ THI TUYỂN SINH VÀO LỚP 10 MÔN TIẾNG ANH SỞ GIÁO DỤC HẢI DƯ...Nguyen Thanh Tu Collection
 
Stl Algorithms in C++ jjjjjjjjjjjjjjjjjj
Stl Algorithms in C++ jjjjjjjjjjjjjjjjjjStl Algorithms in C++ jjjjjjjjjjjjjjjjjj
Stl Algorithms in C++ jjjjjjjjjjjjjjjjjjMohammed Sikander
 
Analyzing and resolving a communication crisis in Dhaka textiles LTD.pptx
Analyzing and resolving a communication crisis in Dhaka textiles LTD.pptxAnalyzing and resolving a communication crisis in Dhaka textiles LTD.pptx
Analyzing and resolving a communication crisis in Dhaka textiles LTD.pptxLimon Prince
 
Major project report on Tata Motors and its marketing strategies
Major project report on Tata Motors and its marketing strategiesMajor project report on Tata Motors and its marketing strategies
Major project report on Tata Motors and its marketing strategiesAmanpreetKaur157993
 
MOOD STABLIZERS DRUGS.pptx
MOOD     STABLIZERS           DRUGS.pptxMOOD     STABLIZERS           DRUGS.pptx
MOOD STABLIZERS DRUGS.pptxPoojaSen20
 
TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT TOÁN 2024 - TỪ CÁC TRƯỜNG, TRƯỜNG...
TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT TOÁN 2024 - TỪ CÁC TRƯỜNG, TRƯỜNG...TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT TOÁN 2024 - TỪ CÁC TRƯỜNG, TRƯỜNG...
TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT TOÁN 2024 - TỪ CÁC TRƯỜNG, TRƯỜNG...Nguyen Thanh Tu Collection
 
Sternal Fractures & Dislocations - EMGuidewire Radiology Reading Room
Sternal Fractures & Dislocations - EMGuidewire Radiology Reading RoomSternal Fractures & Dislocations - EMGuidewire Radiology Reading Room
Sternal Fractures & Dislocations - EMGuidewire Radiology Reading RoomSean M. Fox
 
AIM of Education-Teachers Training-2024.ppt
AIM of Education-Teachers Training-2024.pptAIM of Education-Teachers Training-2024.ppt
AIM of Education-Teachers Training-2024.pptNishitharanjan Rout
 
OSCM Unit 2_Operations Processes & Systems
OSCM Unit 2_Operations Processes & SystemsOSCM Unit 2_Operations Processes & Systems
OSCM Unit 2_Operations Processes & SystemsSandeep D Chaudhary
 

Recently uploaded (20)

Spellings Wk 4 and Wk 5 for Grade 4 at CAPS
Spellings Wk 4 and Wk 5 for Grade 4 at CAPSSpellings Wk 4 and Wk 5 for Grade 4 at CAPS
Spellings Wk 4 and Wk 5 for Grade 4 at CAPS
 
會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽
會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽
會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽
 
Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...
Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...
Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...
 
Mattingly "AI & Prompt Design: Named Entity Recognition"
Mattingly "AI & Prompt Design: Named Entity Recognition"Mattingly "AI & Prompt Design: Named Entity Recognition"
Mattingly "AI & Prompt Design: Named Entity Recognition"
 
The Story of Village Palampur Class 9 Free Study Material PDF
The Story of Village Palampur Class 9 Free Study Material PDFThe Story of Village Palampur Class 9 Free Study Material PDF
The Story of Village Palampur Class 9 Free Study Material PDF
 
Graduate Outcomes Presentation Slides - English (v3).pptx
Graduate Outcomes Presentation Slides - English (v3).pptxGraduate Outcomes Presentation Slides - English (v3).pptx
Graduate Outcomes Presentation Slides - English (v3).pptx
 
會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文
會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文
會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文
 
ESSENTIAL of (CS/IT/IS) class 07 (Networks)
ESSENTIAL of (CS/IT/IS) class 07 (Networks)ESSENTIAL of (CS/IT/IS) class 07 (Networks)
ESSENTIAL of (CS/IT/IS) class 07 (Networks)
 
ĐỀ THAM KHẢO KÌ THI TUYỂN SINH VÀO LỚP 10 MÔN TIẾNG ANH FORM 50 CÂU TRẮC NGHI...
ĐỀ THAM KHẢO KÌ THI TUYỂN SINH VÀO LỚP 10 MÔN TIẾNG ANH FORM 50 CÂU TRẮC NGHI...ĐỀ THAM KHẢO KÌ THI TUYỂN SINH VÀO LỚP 10 MÔN TIẾNG ANH FORM 50 CÂU TRẮC NGHI...
ĐỀ THAM KHẢO KÌ THI TUYỂN SINH VÀO LỚP 10 MÔN TIẾNG ANH FORM 50 CÂU TRẮC NGHI...
 
24 ĐỀ THAM KHẢO KÌ THI TUYỂN SINH VÀO LỚP 10 MÔN TIẾNG ANH SỞ GIÁO DỤC HẢI DƯ...
24 ĐỀ THAM KHẢO KÌ THI TUYỂN SINH VÀO LỚP 10 MÔN TIẾNG ANH SỞ GIÁO DỤC HẢI DƯ...24 ĐỀ THAM KHẢO KÌ THI TUYỂN SINH VÀO LỚP 10 MÔN TIẾNG ANH SỞ GIÁO DỤC HẢI DƯ...
24 ĐỀ THAM KHẢO KÌ THI TUYỂN SINH VÀO LỚP 10 MÔN TIẾNG ANH SỞ GIÁO DỤC HẢI DƯ...
 
Stl Algorithms in C++ jjjjjjjjjjjjjjjjjj
Stl Algorithms in C++ jjjjjjjjjjjjjjjjjjStl Algorithms in C++ jjjjjjjjjjjjjjjjjj
Stl Algorithms in C++ jjjjjjjjjjjjjjjjjj
 
Analyzing and resolving a communication crisis in Dhaka textiles LTD.pptx
Analyzing and resolving a communication crisis in Dhaka textiles LTD.pptxAnalyzing and resolving a communication crisis in Dhaka textiles LTD.pptx
Analyzing and resolving a communication crisis in Dhaka textiles LTD.pptx
 
Major project report on Tata Motors and its marketing strategies
Major project report on Tata Motors and its marketing strategiesMajor project report on Tata Motors and its marketing strategies
Major project report on Tata Motors and its marketing strategies
 
MOOD STABLIZERS DRUGS.pptx
MOOD     STABLIZERS           DRUGS.pptxMOOD     STABLIZERS           DRUGS.pptx
MOOD STABLIZERS DRUGS.pptx
 
TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT TOÁN 2024 - TỪ CÁC TRƯỜNG, TRƯỜNG...
TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT TOÁN 2024 - TỪ CÁC TRƯỜNG, TRƯỜNG...TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT TOÁN 2024 - TỪ CÁC TRƯỜNG, TRƯỜNG...
TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT TOÁN 2024 - TỪ CÁC TRƯỜNG, TRƯỜNG...
 
Mattingly "AI and Prompt Design: LLMs with NER"
Mattingly "AI and Prompt Design: LLMs with NER"Mattingly "AI and Prompt Design: LLMs with NER"
Mattingly "AI and Prompt Design: LLMs with NER"
 
Sternal Fractures & Dislocations - EMGuidewire Radiology Reading Room
Sternal Fractures & Dislocations - EMGuidewire Radiology Reading RoomSternal Fractures & Dislocations - EMGuidewire Radiology Reading Room
Sternal Fractures & Dislocations - EMGuidewire Radiology Reading Room
 
VAMOS CUIDAR DO NOSSO PLANETA! .
VAMOS CUIDAR DO NOSSO PLANETA!                    .VAMOS CUIDAR DO NOSSO PLANETA!                    .
VAMOS CUIDAR DO NOSSO PLANETA! .
 
AIM of Education-Teachers Training-2024.ppt
AIM of Education-Teachers Training-2024.pptAIM of Education-Teachers Training-2024.ppt
AIM of Education-Teachers Training-2024.ppt
 
OSCM Unit 2_Operations Processes & Systems
OSCM Unit 2_Operations Processes & SystemsOSCM Unit 2_Operations Processes & Systems
OSCM Unit 2_Operations Processes & Systems
 

Case Study 2 Public Key InfrastructureSuppose you are the Infor.docx

  • 1. Case Study 2: Public Key Infrastructure Suppose you are the Information Security Director at a small software company. The organization currently utilizes a Microsoft Server 2012 Active Directory domain administered by your information security team. Mostly software developers and a relatively small number of administrative personnel comprise the remainder of the organization. You have convinced business unit leaders that it would be in the best interest of the company to use a public key infrastructure (PKI) in order to provide a framework that fosters confidentiality, integrity, authentication, and nonrepudiation. Email clients, virtual private network (VPN) products, Web server components, and domain controllers would utilize digital certificates issued by the certificate authority (CA). Additionally, the company would use digital certificates to sign software developed by the company in order to demonstrate software authenticity to the customer. Write a two to three (2-3) page paper in which you: 1. Analyze the fundamentals of PKI, and determine the primary ways in which its features and functions could benefit your organization and its information security department. 2. Propose one (1) way in which the PKI could assist in the process of signing the company’s software, and explain the main reason why a customer could then believe that software to be authentic. 3. Compare and contrast public and in-house CAs. Include the positive and negative characteristics of each type of certificate authority, and provide a sound recommendation of and a justification for which you would consider implementing within
  • 2. your organization. Explain your rationale. 4. Use at least three (3) quality resources in this assignment (no more than 2-3 years old) from material outside the textbook. Note: Wikipedia and similar Websites do not qualify as quality resources. Your assignment must follow these formatting requirements: · Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. Check with your professor for any additional instructions. · Include a cover page containing the title of the assignment, the student’s name, the professor’s name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length. The specific course learning outcomes associated with this assignment are: · Explain how businesses apply cryptography in maintaining information security. · Use technology and information resources to research issues in information systems security. · Write clearly and concisely about network security topics using proper writing mechanics and technical style conventions
  • 3. Case Study 2: Public Key Infrastructure Criteria Unacceptable Below 60% F Meets Minimum Expectations 60-69% D Fair 70-79% C Proficient 80-89% B Exemplary 90-100% A 1. Analyze the fundamentals of PKI, and determine the primary ways in which its features and functions could benefit your organization and its information security department. Weight: 30% Did not submit or incompletely analyzed the fundamentals of PKI; did not submit or incompletely determined the primary ways in which its features and functions could benefit your organization and its information security department. Insufficiently analyzed the fundamentals of PKI; insufficiently determined the primary ways in which its features and functions could benefit your organization and its information security department. Partially analyzed
  • 4. the fundamentals of PKI; partially determined the primary ways in which its features and functions could benefit your organization and its information security department. Satisfactorily analyzed the fundamentals of PKI; satisfactorily determined the primary ways in which its features and functions could benefit your organization and its information security department. Thoroughly analyzed the fundamentals of PKI; thoroughly determined the primary ways in which its features and functions could benefit your organization and its information security department. 2. Propose one (1) way in which the PKI could assist in the process of signing the company’s software, and explain the main reason why a customer could then believe that software to be authentic. Weight: 25% Did not submit or incompletely proposed one (1) way in which the PKI could assist in the process of signing the company’s software; did not submit or incompletely explained the main reason why a customer could then believe that software to be authentic. Insufficiently proposed one (1) way in which the PKI could assist in the process of signing the company’s software; insufficiently explained the main reason why a customer could then believe that software to be authentic. Partially proposed one (1) way in which the PKI could assist in the process of signing the company’s software; partially explained the main
  • 5. reason why a customer could then believe that software to be authentic. Satisfactorily proposed one (1) way in which the PKI could assist in the process of signing the company’s software; satisfactorily explained the main reason why a customer could then believe that software to be authentic. Thoroughly proposed one (1) way in which the PKI could assist in the process of signing the company’s software; thoroughly explained the main reason why a customer could then believe that software to be authentic. 3. Compare and contrast public and in-house CAs. Include the positive and negative characteristics of each type of certificate authority, and provide a sound recommendation of and a justification for which you would consider implementing within your organization. Explain your rationale. Weight: 30% Did not submit or incompletely compared and contrastedpublic and in-house CAs. Did not submit or incompletely included the positive and negative characteristics of each type of certificate authority; did not submit or incompletely provided a sound recommendation of and a justification for which you would consider implementing within your organization. Did not submit or incompletely explained your rationale. Insufficiently compared and contrastedpublic and in-house CAs.Insufficientlyincluded the positive and negative characteristics of each type of certificate authority; insufficiently provided a sound recommendation of and a justification for which you would consider implementing within your organization.Insufficientlyexplained your rationale. Partially compared and contrastedpublic and in-house
  • 6. CAs.Partiallyincluded the positive and negative characteristics of each type of certificate authority; partially provided a sound recommendation of and a justification for which you would consider implementing within your organization.Partiallyexplained your rationale. Satisfactorily compared and contrastedpublic and in-house CAs.Satisfactorilyincluded the positive and negative characteristics of each type of certificate authority; satisfactorily provided a sound recommendation of and a justification for which you would consider implementing within your organization.Satisfactorilyexplained your rationale. Thoroughly compared and contrastedpublic and in-house CAs.Thoroughlyincluded the positive and negative characteristics of each type of certificate authority; thoroughly provided a sound recommendation of and a justification for which you would consider implementing within your organization.Thoroughlyexplained your rationale. 4. 3 references Weight: 5% No references provided Does not meet the required number of references; all references poor quality choices. Does not meet the required number of references; some references poor quality choices. Meets number of required references; all references high quality choices. Exceeds number of required references; all references high quality choices. 5. Clarity, writing mechanics, and formatting requirements Weight: 10% More than 8 errors present 7-8 errors present 5-6 errors present 3-4 errors present 0-2 errors present