Your Perfect Assignment is Just a Click Away

We Write Custom Academic Papers

100% Original, Plagiarism Free, Customized to your instructions!

glass
pen
clip
papers
heaphones

CST620 UMUC Enterprise Key Management Plan Assignment

CST620 UMUC Enterprise Key Management Plan Assignment

CST620 UMUC Enterprise Key Management Plan Assignment
Question Description
Deliverable is an Enterprise Key Management Plan:
An eight to 10 page double-spaced Word document with citations in APA format. The page count does not include figures, diagrams, tables or citations. Need diagrams, tables or citation.
Everything BOLD needs to be in the EKM Plan
Project 1: Enterprise Key Management
Project 1 Start Here
Transcript – please read to get the baseline of
As a security architect and cryptography specialist for Superior Healthcare you’re familiar with the information systems throughout the company and the ranges of sensitivity in the information that is used, stored, and transmitted. You’re also expected to understand healthcare regulations and guidelines because you’re responsible for advising the Chief Information Security Officer, or CSO, on a range of patient services, including the confidentiality and integrity of billing, payments, and insurance claims processing, as well as the security of patient information covered under the Health Insurance Portability and Accountability Act, or HIPAA.
You also have a team of Security Engineers, SEs, that help implement new cryptographic plans and policies and collaborate with the IT deployment and operations department during migrations to new technology initiatives. This week, this CSO calls you into his office to let you know about the company’s latest initiative.
“We’re implementing eFi, web-based electronic health care, and that means we need to modernize our enterprise key management system during the migration.”, he says. The CSO asks for an enterprise key management plan that identifies the top components, possible solutions, comparisons of each solution, risks and benefits, and proposed risk mitigations.
The plan will help create an enterprise key management system. The SEs would be responsible for the implementation, operation, and maintenance of the plan and system. The CSO also wants you to come up with an enterprise key management policy that provides processes, procedures, rules of behavior, and training.
The new web -based system needs to be running in a month. So you’ll have a week to put together your enterprise key management plan and the accompanying policy.
Transcript End
Cryptography is the application of algorithms to ensure the confidentiality, integrity, and availability of data, while it is at rest, in motion, or in use. Cryptography systems can include local encryptions at the file or disk level or databases. Cryptography systems can also extend to an enterprise-wide public key infrastructure for whole agencies or corporations.
Project 1 Step 1: Identify Components of Key Management
Key management will be an important aspect of the new electronic protected health information (e-PHI). Key management is often considered the most difficult part of designing a cryptosystem.
Choose a fictitious or an actual organization. The idea is to provide an overview of the current state of enterprise key management for Superior Health Care.
Review these authentication resources to learn about authentication and the characteristics of key management.
Provide a high-level, top-layer network view (diagram) of the systems in Superior Health Care. The diagram can be a bubble chart or Visio drawing of a simple network diagram with servers. Conduct independent research to identify a suitable network diagram.
Read these resources on data at rest, data in use, and data in motion.
Identify data at rest, data in use, and data in motion as it could apply to your organization. Start by focusing on where data are stored and how data are accessed.
Review these resources on insecure handling, and identify areas where insecure handling may be a concern for your organization.
Incorporate this information in your key management plan.
In the next step, you will consider key management capabilities.
Project 1 Step 2: Learning Key Management Capabilities
Conduct independent research on Public Key Infrastructure as it applies to your organization.
In the next step, you will identify the key management gaps, risks, solutions, and challenges found in corporations.
Project 1 Step 3: Identify Key Management Gaps, Risks, Solutions, and Challenges
In the previous step, you identified the key components of an enterprise key management system. In this step, you will conduct independent research on key management issues in existing organizations. You will use this research to help identify gaps in key management, in each of the key management areas within Superior Health Care.
Conduct independent research to identify typical gaps in key management within organizations. Incorporate and cite actual findings within your key management plan. If unable to find data on real organizations, use authoritative material discussing typical gaps.
Identify crypto attack and other risks to the cryptographic systems posed by these gaps. Read these resources to brush up on your unders

Order Solution Now

Our Service Charter

1. Professional & Expert Writers: Homework Discussion only hires the best. Our writers are specially selected and recruited, after which they undergo further training to perfect their skills for specialization purposes. Moreover, our writers are holders of masters and Ph.D. degrees. They have impressive academic records, besides being native English speakers.

2. Top Quality Papers: Our customers are always guaranteed of papers that exceed their expectations. All our writers have +5 years of experience. This implies that all papers are written by individuals who are experts in their fields. In addition, the quality team reviews all the papers before sending them to the customers.

3. Plagiarism-Free Papers: All papers provided by Homework Discussion are written from scratch. Appropriate referencing and citation of key information are followed. Plagiarism checkers are used by the Quality assurance team and our editors just to double-check that there are no instances of plagiarism.

4. Timely Delivery: Time wasted is equivalent to a failed dedication and commitment. Homework Discussion is known for timely delivery of any pending customer orders. Customers are well informed of the progress of their papers to ensure they keep track of what the writer is providing before the final draft is sent for grading.

5. Affordable Prices: Our prices are fairly structured to fit in all groups. Any customer willing to place their assignments with us can do so at very affordable prices. In addition, our customers enjoy regular discounts and bonuses.

6. 24/7 Customer Support: At Homework Discussion, we have put in place a team of experts who answer to all customer inquiries promptly. The best part is the ever-availability of the team. Customers can make inquiries anytime.