APA Computer Science

Enterprise Key Management

1.    Enterprise Key Management Plan: An eight-page double-spaced Word document with citations in APA format. The page count does not include figures, diagrams, tables, or citations.
2.    Enterprise Key Management Policy: A two -page double-spaced Word document.

Project 1
I.    Perform independent research
a.    Focus is on key management for new electronic protected health information (e-PHI) system
b.    Information may be fictitious or modeled after existing corporation
II.    Step 1: ID components of key management
a.    Overview of current state of enterprise key management for SHC
b.    High-level, top-layer network view diagram of systems at SHC
c.    Review authentication
d.    Identify
i.    data at rest
ii.    data in use
iii.    data in motion
iv.    where data is stored
v.    how its accessed
vi.    areas where insecure handling may be a concern
III.    Step 3: ID key management gaps, risks, solutions and challenges
a.    Research key management issues in exiting corporations
b.    ID gaps in key management in existing corporations
c.    ID proposed risks to crypto systems as result of these gaps
i.    Review crypto attacks
d.    Propose solutions companies have used to address gaps
e.    ID what is needed to implement solutions
f.    ID challenges other companies have faced implementing key management system
g.    Include proposed remedies to challenges
h.    Create and submit summary table of information
IV.    Step 4: Provide additional considerations for the CISO
a.    Introduce these objectives on enterprise key management systems as it would apply to SHC
b.    Explain use of encryption and benefits
c.    Evaluate and assess whether or not to incorporate
i.    File encryption
ii.    Full disk encryption
iii.    Partition encryption
iv.    Review
1.    Uses of encryption
2.    Hash functions
3.    Types of encryption
4.    DES
5.    Triple DES
d.    Describe use and purpose of hashes and digital signatures
i.    Review authentication
e.    Explain use of cryptography and cryptanalysis in data confidentiality
i.    Review cryptanalysis
ii.    Research need, cost and benefits to adding cryptanalysts to corporate workforce
iii.    If dont develop it in SHC, what are other means to obtain results of cryptanalysts
f.    Explain concepts in practice commonly used for data confidentiality
i.    Private and public key protocol for authentication
ii.    Public key infrastructure
1.    Review public key infrastructure
iii.    X.509 cryptography standard
1.    Review x.509
iv.    PKI security
V.    Step 5: Analyze different cryptographic systems
a.    In-use by other companies or be considered for procuring
b.    ID what key system products are available on the market
c.    Describe cryptographic system
i.    Effectiveness
ii.    Efficiencies
d.    Analyze trade-offs of different system and consider
i.    Security index rating
ii.    Level of complexity
iii.    Availability or utilization of system resources
e.    Information on expenses as pertains to various cryptographic ciphers
i.    Review ciphers resource
VI.    Step 6: Develop the Enterprise key management plan
a.    Use learning and materials produced in previous steps
b.    Devise plan for implementation, operation and maintenance of new system
c.    Identify:
i.    Key components
ii.    Possible solutions
iii.    Risks and benefits comparisons of each solution
iv.    Proposed mitigations to the risks
VII.    Step 7: develop the enterprise key management policy
a.    Devise policy that provides the processes, procedures, rules of behavior and training within the enterprise key management system
b.    Review and address:
i.    Digital certificates
ii.    Certificate authority
iii.    Certificate revocation lists

Deliverables
Enterprise key management plan (8- pages)
I.    Coversheet
II.    Introduction
III.    Purpose
IV.    Key components
a.    Overview of current state of enterprise key management for SHC
b.    High-level, top-layer network view diagram of systems at SHC
c.    Review authentication
d.    Identify
i.    data at rest
ii.    data in use
iii.    data in motion
iv.    where data is stored
v.    how its accessed
vi.    areas where insecure handling may be a concern
V.    Implementation
a.    Integrate information from steps to describe how one would implement key management system
b.    Research key management issues in exiting corporations
c.    ID gaps in ley management in existing corporations
d.    ID proposed risks to crypto systems as result of these gaps
i.    Review crypto attacks
e.    Propose solutions companies have used to address gaps
f.    ID what is needed to implement solutions
g.    ID challenges other companies have faced implementing key management system
h.    Include proposed remedies to challenges
i.    Create and submit summary table of information
VI.    Operation
a.    Integrate information from steps to describe how one would operate a key management system
VII.    Maintenance
a.    Integrate information from steps to describe how one would maintain a key management system
VIII.    Benefits and risks
a.    Summarize what the benefits and risks are to an enterprise key management system
IX.    Summary/conclusion
X.    References

Enterprise key management policy (2 pages)
I.    Coversheet
II.    Policy statement
III.    Reason for Policy
IV.    Definitions
V.    Responsible Executive and Office
VI.    Entities Affected by this Policy
VII.    Procedures
a.    General (address digital certificates, certificate authority, certificate revocation lists)
b.    Responsibilities
c.    Rules of behavior
d.    Training
e.    Enforcement