is this an ekmp relavant

Deliverable is an Enterprise Key Management Plan:

An eight to 10 page double-spaced Word document with citations in APA format. The page count does not include figures, diagrams, tables or citations. Need diagrams, tables or citation.

Everything BOLD needs to be in the EKM Plan

Project 1: Enterprise Key Management

Project 1 Start Here

Transcript – please read to get the baseline of

As a security architect and cryptography specialist for Superior Healthcare you’re familiar with the information systems throughout the company and the ranges of sensitivity in the information that is used, stored, and transmitted. You’re also expected to understand healthcare regulations and guidelines because you’re responsible for advising the Chief Information Security Officer, or CSO, on a range of patient services, including the confidentiality and integrity of billing, payments, and insurance claims processing, as well as the security of patient information covered under the Health Insurance Portability and Accountability Act, or HIPAA.

You also have a team of Security Engineers, SEs, that help implement new cryptographic plans and policies and collaborate with the IT deployment and operations department during migrations to new technology initiatives. This week, this CSO calls you into his office to let you know about the company’s latest initiative.

“We’re implementing eFi, web-based electronic health care, and that means we need to modernize our enterprise key management system during the migration.”, he says. The CSO asks for an enterprise key management plan that identifies the top components, possible solutions, comparisons of each solution, risks and benefits, and proposed risk mitigations.

The plan will help create an enterprise key management system. The SEs would be responsible for the implementation, operation, and maintenance of the plan and system. The CSO also wants you to come up with an enterprise key management policy that provides processes, procedures, rules of behavior, and training.

The new web -based system needs to be running in a month. So you’ll have a week to put together your enterprise key management plan and the accompanying policy.

Transcript End

Cryptography is the application of algorithms to ensure the confidentiality, integrity, and availability of data, while it is at rest, in motion, or in use. Cryptography systems can include local encryptions at the file or disk level or databases. Cryptography systems can also extend to an enterprise-wide public key infrastructure for whole agencies or corporations.

Project 1 Step 1: Identify Components of Key Management

Key management will be an important aspect of the new electronic protected health information (e-PHI). Key management is often considered the most difficult part of designing a cryptosystem.

Choose a fictitious or an actual organization. The idea is to provide an overview of the current state of enterprise key management for Superior Health Care.

Review these authentication resources to learn about authentication and the characteristics of key management.

Provide a high-level, top-layer network view (diagram) of the systems in Superior Health Care. The diagram can be a bubble chart or Visio drawing of a simple network diagram with servers. Conduct independent research to identify a suitable network diagram.

Read these resources on data at rest, data in use, and data in motion.

Identify data at rest, data in use, and data in motion as it could apply to your organization. Start by focusing on where data are stored and how data are accessed.

Review these resources on insecure handling, and identify areas where insecure handling may be a concern for your organization.

Incorporate this information in your key management plan.

In the next step, you will consider key management capabilities.

Project 1 Step 2: Learning Key Management Capabilities

Conduct independent research on Public Key Infrastructure as it applies to your organization.

In the next step, you will identify the key management gaps, risks, solutions, and challenges found in corporations.

Project 1 Step 3: Identify Key Management Gaps, Risks, Solutions, and Challenges

In the previous step, you identified the key components of an enterprise key management system. In this step, you will conduct independent research on key management issues in existing organizations. You will use this research to help identify gaps in key management, in each of the key management areas within Superior Health Care.

Conduct independent research to identify typical gaps in key management within organizations. Incorporate and cite actual findings within your key management plan. If unable to find data on real organizations, use authoritative material discussing typical gaps.

Identify crypto attack and other risks to the cryptographic systems posed by these gaps. Read these resources to brush up on your understanding of crypto attacks

Propose solutions organizations may use to address these gaps and identify necessary components of these solutions.

Finally, identify challenges, including remedies, other organizations have faced in implementing a key management system.

Include this information in your enterprise key management plan.

Provide a summary table of the information within your key management plan.

Incorporate this information in your implementation plan.

In the next step, you will provide additional ideas for the Chief information security officer (CISO) to consider.

Project 1 Step 4: Provide Additional Considerations for the CISO

You have satisfactorily identified key management gaps. Incorporate these additional objectives of an enterprise key management system, as you compile information for the CISO.

1. Explain the uses of encryption and the benefits of securing communications by hash functions and other types of encryption. When discussing encryption, be sure to evaluate and assess whether or not to incorporate file encryption, full disc encryption, and partition encryption. Discuss the benefits of using DES, triple DES, or other encryption technologies. To complete this task, review the following resources:

2. Describe the use and purpose of hashes and digital signatures in providing message authentication and integrity. Review these resources on authentication to further your understanding. Focus on resources pertaining to message authentication.

3. Review the resources related to cryptanalysis. Explain the use of cryptography and cryptanalysis in data confidentiality. Cryptanalysts are a very technical and specialized workforce. Your organization already has a workforce of Security Engineers (SEs). Cryptanalysts could be added to support part of the operation and maintenance functions of the enterprise key management system. Conduct research on the need, cost, and benefits of adding cryptanalysts to the organization’s workforce. Determine if it will be more effective to develop the SEs to perform these tasks. Discuss alternative ways for obtaining cryptanalysis if the organization chooses not to maintain this new skilled community in-house.

4. Research and explain the concepts and practices commonly used for data confidentiality: the private and public key protocol for authentication, public key infrastructure (PKI), the x.509 cryptography standard, and PKI security. Read about the following cryptography and identity management concepts: public key infrastructure and the x.509 cryptography standard.

Incorporate this information in your implementation plan.

In the next step, you will provide information on different cryptographic systems for the CISO.

Project 1 Step 5: Analyze Cryptographic Systems

In the previous step, you covered aspects of cryptographic methods. In this step, you will recommend cryptographic systems that your organization should consider procuring. Independently research commercially available enterprise key management system products, discuss at least two systems and recommend a system for Superior Health Care.

Describe the cryptographic system, its effectiveness and efficiencies.

Provide an analysis of the trade-offs of different cryptographic systems.

Review and include information learned from conducting independent research on the following topics:

  • Security index rating
  • Level of complexity
  • Availability or utilization of system resources

Include information on the possible complexity and expense of implementing and operating various cryptographic ciphers. Check out these resources on ciphers to familiarize yourself with the topic.

Incorporate this information in your implementation plan.

In the next step, you will begin final work on the enterprise key management plan.

Project 1 Step 6: Develop the Enterprise Key Management Plan

In the previous steps, you gathered information about systems used elsewhere. Using the materials produced in those steps, develop your Enterprise Key Management Plan for implementation, operation, and maintenance of the new system. Address these as separate sections in the plan.

In this plan, you will identify the key components, the possible solutions, the risks, and benefits comparisons of each solution, and proposed mitigations to the risks. These, too, should be considered as a separate section or could be integrated within the implementation, operation, and maintenance sections

A possible outline could be:

  • Introduction
  • Purpose
  • Key Components
  • Implementation
  • Operation
  • Maintenance
  • Benefits and Risks
  • Summary/Conclusion

The following are the deliverables for this segment of the project:

Looking for a Similar Assignment? Order now and Get a Discount! Use Coupon Code "Newclient"
0 replies

Leave a Reply

Want to join the discussion?
Feel free to contribute!

Leave a Reply

Your email address will not be published.