Project 1: Enterprise Key Management Enterprise Key Management Plan: An eight- to 10-page double-spaced Word document with citations in APA format. The page count does not include figures, diagrams,...

1 answer below »
I need this ASAP!!!
It's a two-part project. One paper (management plan) needs to be 8-10 pages and the second paper (management policy) needs to be 2-3 pages.


Project 1: Enterprise Key Management Enterprise Key Management Plan: An eight- to 10-page double-spaced Word document with citations in APA format. The page count does not include figures, diagrams, tables, or citations. Step 1: Identify Components of Key Management 1. Key management will be an important aspect of the new electronic protected health information (e-PHI). Key management is often considered the most difficult part of designing a cryptosystem. 2. Choose a fictitious or an actual organization. The idea is to provide an overview of the current state of enterprise key management for Superior Health Care. 3. Review these authentication resources to learn about authentication and the characteristics of key management. 4. Provide a high-level, top-layer network view (diagram) of the systems in Superior Health Care. The diagram can be a bubble chart or Visio drawing of a simple network diagram with servers. Conduct independent research to identify a suitable network diagram. 5. Read these resources on data at rest, data in use, and data in motion. 6. Identify data at rest, data in use, and data in motion as it could apply to your organization. Start by focusing on where data are stored and how data are accessed. 7. Review these resources on insecure handlingand identify areas where insecure handling may be a concern for your organization. 8. Incorporate this information in your key management plan. 9. In the next step, you will consider key management capabilities. Step 2: Skipped-Already Completed Step 3: Identify Key Management Gaps, Risks, Solutions, and Challenges In a previous step, you identified the key components of an enterprise key management system. In this step, you will conduct independent research on key management issues in existing organizations. You will use this research to help identify gaps in key management, in each of the key management areas within Superior Health Care. Conduct independent research to identify typical gaps in key management within organizations. Incorporate and cite actual findings within your key management plan. If unable to find data on real organizations, use authoritative material discussing typical gaps. Identify crypto attacks and other risks to the cryptographic systems posed by these gaps. Read these resources to brush up on your understanding of crypto attacks. Propose solutions organizations may use to address these gaps and identify necessary components of these solutions. Finally, identify challenges, including remedies, other organizations have faced in implementing a key management system. Include this information in your enterprise key management plan. Provide a summary table of the information within your key management plan. Incorporate this information in your implementation plan. In the next step, you will provide additional ideas for the chief information security officer (CISO) to consider. Step 4: Provide Additional Considerations for the CISO You have satisfactorily identified key management gaps. Incorporate these additional objectives of an enterprise key management system as you compile information for the CISO. 1. Explain the uses of encryption and the benefits of securing communications by hash functions and other types of encryption. When discussing encryption, be sure to evaluate and assess whether or not to incorporate file encryption, full disc encryption, and partition encryption. Discuss the benefits of using triple DES or other encryption technologies. To complete this task, review the following resources: a. uses of encryption b. types of encryption c. hash functions 2. Describe the use and purpose of hashes and digital signatures in providing message authentication and integrity. Review these resources on authentication to further your understanding. Focus on resources pertaining to message authentication. 3. Review the resources related to cryptanalysis. Explain the use of cryptography and cryptanalysis in data confidentiality. Cryptanalysts are a very technical and specialized workforce. Your organization already has a workforce of security engineers (SEs). Cryptanalysts could be added to support part of the operation and maintenance functions of the enterprise key management system. Conduct research on the need, cost, and benefits of adding cryptanalysts to the organization’s workforce. Determine if it will be more effective to develop the SEs to perform these tasks. Discuss alternative ways for obtaining cryptanalysis if the organization chooses not to maintain this new skilled community in-house. 4. Research and explain the concepts and practices commonly used for data confidentiality: the private and public key protocol for authentication, public key infrastructure (PKI), the X.509 cryptography standard, and PKI security. Read about the following cryptography and identity management concepts: public key infrastructure and the X.509 cryptography standard. Keep in mind that sometimes it takes considerable evidence and research for organizational leaders to buy in and provide resources. Incorporate this information in your implementation plan. In the next step, you will provide information on different cryptographic systems for the CISO. Step 5: Analyze Cryptographic Systems In the previous step, you covered aspects of cryptographic methods. In this step, you will recommend cryptographic systems that your organization should consider procuring. Independently research commercially available enterprise key management system products, discuss at least two systems, and recommend a system for Superior Health Care. Describe the cryptographic system, its effectiveness, and its efficiencies. Provide an analysis of the trade-offs of different cryptographic systems. Review and include information learned from conducting independent research on the following topics: · security index rating · level of complexity · availability or utilization of system resources Include information on the possible complexity and expense of implementing and operating various cryptographic ciphers. Check out these resources on ciphers to familiarize yourself with the topic. Incorporate this information in your implementation plan. In the next step, you will begin final work on the enterprise key management plan. The following exercise, Introduction to Cryptographic Tools, is to introduce you to or help you better understand some basic cryptographic concepts and tools for both encryption and decryption processes. Step 6: Develop the Enterprise Key Management Plan In the previous steps, you gathered information about systems used elsewhere. Using the materials produced in those steps, develop your Enterprise Key Management Plan for implementation, operation, and maintenance of the new system. Address these as separate sections in the plan. In this plan, you will identify the key components, the possible solutions, the risks, and benefits comparisons of each solution, and proposed mitigations to the risks. These, too, should be considered as a separate section or could be integrated within the implementation, operation, and maintenance sections. A possible outline could be: · Introduction · Purpose · Key Components · Implementation · Operation · Maintenance · Benefits and Risks · Summary/Conclusion Step 7: Develop the Enterprise Key Management Policy The final step in this project requires you to use the information from the previous steps to develop the Enterprise Key Management Policy. The policy governs the processes, procedures, rules of behavior, and training for users and administrators of the enterprise key management system. Research similar policy documents used by other organizations and adapt an appropriate example to create your policy. Review and discuss the following within the policy: · digital certificates · certificate authority · certificate revocation lists Discuss different scenarios and hypothetical situations. For example, the policy could require that when employees leave the company, their digital certificates must be revoked within 24 hours. Another could require that employees must receive initial and annual security training. Include at least three scenarios and provide policy standards, guidance, and procedures that would be invoked by the enterprise key management policy. Each statement should be short and should define what someone would have to do to comply with the policy. The following is the deliverable for this segment of the project: two- to three-page double- spaced 1 9 Enterprise Key Management Plan First Name Last Name University of Maryland Global Campus CST 620: Prevention of Cyber Attack Methodologies Dr. Diana Lucas July20, 2021 Superior Healthcare Enterprise Key Management Plan Give me a very brief introduction to Superior Healthcare (a fictitious organization but please describe it as if it was a real one), for which you are the Security Architect and Cryptography Specialist, assigned to the company Chief Information Security Officer (CSO). Briefly discuss that Superior Healthcare will implement eFi (web-based electronic health care), which means the organization will also need to modernize their enterprise key management system. Why does Superior Healthcare need an enterprise key management plan? What main points will I expect to read ahead in this plan? Key Components Provide an overview of the current state of enterprise key management for Superior Health Care. Authentication and Characteristics of Key Management Discuss authentication and the characteristics of key management. Brush up on your knowledge of authentication by reviewing the authentication resources. Network Diagram Discuss the network diagram here but put the diagram itself at the bottom of this plan in the “Figures” section. Refer to Figure X (assign a number) and discuss a high-level, top-layer network view of the systems in Superior Health Care. To do this, start by reading these resources on data at rest, data in use, and data in motion. The diagram can be a bubble chart or Visio drawing of a simple network diagram with servers. Independent research may be used to find one to use. Data Discuss data at rest, data in use, and data in motion as it could apply to your company. Focus on where data is stored and how it’s accessed is a good place to start. Finally, review these resources on insecure handling, and identify areas where insecure handling may be a concern for your organization. Implementation Key Management Issues Discuss key management issues in existing corporations. These will be used to help identify gaps in key management, in each of the key management areas within Superior Health Care. Any factual information should be cited using APA format. If data is lacking, use fictitious information. Then, identify the posed risks to the cryptographic systems as a result of these gaps, including but not limited to crypto attacks. Read these resources to brush up on your understanding of crypto attacks. Proposed Solutions Next, propose solutions that the companies could have used to address these gaps. Compare these solutions and be sure to identify what is needed to implement these solutions. Implementation Challenges Identify challenges other companies have faced in implementing a key management system. Include any proposed remedies to these challenges. Operation Encryption Explain the uses of encryption and the benefits of securing communications by hash functions and other types of encryption. When discussing encryption, be sure to evaluate and assess whether or not to incorporate file encryption, full disc encryption, and partition encryption. Discuss the benefits to using DES, triple DES, or other encryption technologies
Answered 3 days AfterJul 29, 2021

Answer To: Project 1: Enterprise Key Management Enterprise Key Management Plan: An eight- to 10-page...

Deepti answered on Aug 02 2021
126 Votes
1
                                                 9
/
Enterprise Key Management Plan
First Name Last Name
University of Maryland Global Campus
CST 620: Prevention of Cyber Attack Methodologies
Dr. Diana Lucas
July20, 2021
Superior Healthcare Enterprise Key Management Plan
Superior Healthcare Enterprise offers healthcare services like pathology, radiology, maternity, pharmacy, etc. through hospital information support system. It uses patient activity databases, clinical supp
ort system, financial reporting and patient indices (for managing nursing, PAS and OCS).
As a security architect and cryptographic specialist, I strongly recommend SH to implement a web-based electronic health care system since SH needs to holistically address its clinical needs. Assessment of its infrastructure is required to prepare for upgrades and future replacement. An electronic Health Record system will transform the delivery of health and social care by creating a shared patient record that is the primary information source for all health and social care professional, extended further to patients, care givers and service users.
The key points covered in this plan include the description of the current state of SH, authentication resources and characteristics of key management followed by concept of data at rest, in use and in motion to understand the importance od data in each state. Key management issues st SH are enlisted along with solutions that the company should implement. The plan further outlines the challenges that the company may encounter during implementation of the proposed solutions. The concepts of encryption, authentication, cryptanalysis and data confidentiality are discussed in detail to support the proposed solutions. Maintenance of the SH system using cryptographic systems are is proposed and lastly, the benefits and risks of implementing these cryptographic systems are outlined.
Key Components

Authentication and Characteristics of Key Management
SH should implement two-factor authentication in allow authorized users at remote locations to access SH system and to preserve its critical workflows .Security can be further enhanced by adding another layer using push-token notification. Authentication can be made faster and efficient by leveraging this layer across all the business systems of SH. This process will substantially prevent phishing and similar attacks. The system will be secured from unauthorized access to sensitive information. Push notification method keeps authentication invisible to the user while keeping the authentication process convenient. A centralized identity authentication platform is offered to SH’s business functions. The two-factor authentication will ensure that only authorized people can access the devices and servers.
The main characteristics of key management are
· Security- Key management system restricts key access as well as offers insight on key transactions for review. It further implements multi-step verification procedure to allow access to key only to authorized users.
· Scalability- With the growth of business of SH, the system should be able to grow and accommodate more keys.
· Convenience- The system should be easy and convenient to use. It may include user friendly features like biometric fingerprint verification, touch screen and lighted cabinets. Key activity reports should be generated by the system.
· Reliability- The system should be reliable with adequate support and training to the team.
· A suitable key management system should be intuitive for key control for all users for maximum security.
Network Diagram
The design of the network is crucial to the healthcare system’s ability to allow data accessibility to application and staff whenever needed. The data should be securely accessible and available over the network with the growth of the data communication demands. The network should securely transmit data like electronic health records, VoIP, images, and wireless RFID-based real time location systems (RTLS). RTLS should track medical equipment like workstation on wheels, infusion pumps, computers on wheels, monitoring devices, Radiology machines, etc. The main components that require security management include data storage equipment, network equipment and other devices Network equipment includes routers, switches, firewall, wireless access points, virtual private network and VPN access server. Data storage equipment includes database servers and security of data in transit requires security of web servers.
Data
At SH, the data at rest within the computer is the backup data...
SOLUTION.PDF

Answer To This Question Is Available To Download

Related Questions & Answers

More Questions »

Submit New Assignment

Copy and Paste Your Assignment Here