Sie sind auf Seite 1von 3

NT2580: Unit 7 Design an Encryption Strategy

Richman Investments is an investment and consulting firm. Richman wants to expand its business
operations both in the U.S. and in foreign countries. Richman intends to eventually have 10,000
employees in 0 countries.
!he Richman corporate head"uarters is located in #hoenix, $ri%ona. &urrently there are eight branch
offices in'
$tlanta, (eorgia
&hicago, Illinois
&incinnati, )hio
*enver, &olorado
+os $ngeles, &alifornia
,ontreal, &anada
-ew .or/ &ity, -ew .or/
0ashington, *.&.
!he -orth $merican offices have a total of 1,000 employees who use des/tops, laptops, and wireless
devices. $ll offices deal with several sensitive applications. ,anagement from each office shares
application information hosted at the corporate office.
Instructions:
2ased on the security ob3ectives in the following table, design an enterprise encryption strategy4a public
/ey infrastructure 5#6I7 that supports internal employees, external business partners, and clients. Include
the design and reasoning for using the selected encryption strategy.
Security Objective Description
#rivacy or
confidentiality
6eeping information secret from all but those who are
authori%ed to see it
Integrity
8nsuring information has not been altered by unauthori%ed or
un/nown means
8ntity authentication
or identification
&orroborating the identity of an entity, for example a person,
a computer terminal, or a credit card
,essage
authentication
&orroborating the source of information, also /nown as data
origin authentication
Signature 2inding information to an entity
$uthori%ation
#roviding conveyance, to another entity, of official sanction to
do or be something
9alidation
#roviding timeliness of authori%ation to use or manipulate
information or resources
ITT Educational Services age !
NT2580: Unit 7 Design an Encryption Strategy
Security Objective Description
$ccess control Restricting access to resources to privileged entities
&ertification 8ndorsing information by a trusted entity
!imestamping Recording the time of creation or existence of information
0itnessing
9erifying the creation or existence of information by an entity
other than the creator
Receipt $c/nowledging that information has been received
&onfirmation $c/nowledging that services have been provided
)wnership
#roviding an entity with the legal right to use or transfer a
resource to others
$nonymity &oncealing the identity of an entity involved in some process
-onrepudiation #reventing the denial of previous commitments or actions
Revocation Retracting certification or authori%ation
So you want to /now how to be very successful in security: 0ell in a 2ased on the security
ob3ectives in the following table; design an enterprise encryption strategy<a public /ey
infrastructure 5#6I7 that supports internal employees, external business partners, and clients.
Include the design and reasoning for using the selected encryption strategy. =ave a secure
networ/ ta/es a lot of wor/ and has to be monitored > hours a day ? days a wee/. !here are
many different ways to go about this topic the one I am going to pic/ is a public /ey
infrastructure 5#6I7.
)ne security options that can be used is the #rivacy or confidentiality. Using this will help /eep
information confidently from others or outsiders unless you are authori%ed. !his will /eep
employees from finding things such as SS- 5social security numbers7, personal home address,
and@or documents that may be considered sensitive. =aving this as a security option is an all<
around good idea. I would implement this on all of the networ/s@domains that I would manage.
!his #6I card will give access to the following. 8ntering the building, $ccess to specific areas of
the building, !he ability to open encrypted messages@email, !he ability to sign<in@log<off of your
company pc, #unch<in and #unch<out of time cloc/, and Specific access to certain applications
and folders. $ll new employees must fill<out proper paperwor/ given by the building security
team. $fter that paperwor/ has been filled<out, a picture will be ta/en to place onto the card.
!he same process will follow if your #6I card is lost. !he #6I card will roll out in A0 days, once
your card is received please follow the instructions given to activate the card. !he #6I cards will
ITT Educational Services age 2
NT2580: Unit 7 Design an Encryption Strategy
differentiate between the U.S. and foreign countries, but security policies will wor/ within the
United States at every location. $ny other personnel will receive a B9isitorsC badge for temporary
access. !here are a number of many different features to implement on these.
http'@@www.studymode.com@essays@-t1D0<>E1>1DD1.html
ITT Educational Services age "

Das könnte Ihnen auch gefallen