Preview

Unit 7 Design an Encryption Strategy

Satisfactory Essays
Open Document
Open Document
250 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Unit 7 Design an Encryption Strategy
Unit 7 NT 2580 design an encryption strategy NT2580 Introduction to Information Security. November 5, 2014

Using the table given the encryption strategy for Richmond investments would go as follows. I will be using the privacy or confidentiality objective. The basic description for the privacy or confidentiality objective is to keep information secret from all person or persons, except those who are authorized to see it have access. In other words, no one without authorization will be able to gain access to sensitive company information or client information, such as addresses, names, billing information, credit card information, and other personal information. The security option needs to be implemented on all networks in the company’s domain. The public key infrastructure is a set of hardware, software people policies and procedures needed to create, manage, distribute use store and revoke digital certificates. In this case will be using PKI cards, which will allow entrance into the facility, it will also allow entrance into specific areas of the building, allow employees to clock in and out and will allow for signing off and on of company computers. All employees will be issued a card with their name employee ID and photo on the face the card on the backside of the card will be company contact information such as departmental phone numbers, etc. the implementation of a company encryption strategy is extremely important to protect the company. The company’s clients and the overall day-to-day activities, the employees involved themselves in to keep the company running.

You May Also Find These Documents Helpful

  • Satisfactory Essays

    NT2580 Project Part 1

    • 348 Words
    • 1 Page

    Access to the company network will be secured by multiple firewalls set up with our routers. Firewall filters will be set up with a specific list of allowed users and programs. All other traffic will be blocked by default until it has been approved by IT. There will be a limited number of wireless access points around the building, with password access. These passwords will be changed on a regular basis. Access to the local network will be secured by user authentication passwords. Users will be limited to only the system resources that they absolutely need to complete their work. Users’ passwords must be changed every 90 days.…

    • 348 Words
    • 1 Page
    Satisfactory Essays
  • Powerful Essays

    Cmgt410 Team Paper Riordan

    • 4511 Words
    • 19 Pages

    The purpose of this project will be to appropriate a new Human Resources Client-Server Database system. This new system’s capabilities of centralizing Riordan Manufacturing’s data will increase the overall security of the data within. This was expressed to the IT department because of the increasingly overwhelming amount of personal data currently transmitted across unsecure data-lines,…

    • 4511 Words
    • 19 Pages
    Powerful Essays
  • Satisfactory Essays

    Upgrade- Establish endpoint security updates (Antivirus, Malware protection). Upgrade all desktop and laptop Operating Systems. Once all systems are running on the same system, it will be easier to set up security protocols across the board. Make sure Patch updates are being made regularly, set up a specified time frame to check for and install new patches and updates.…

    • 409 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Main Security Concerns: As a rapidly growing business that primarily utilizes IT resources for intranet company communications between and among a single home office and three satellite offices; internal network access controls and remote employee user’s access controls seem to be of primary importance. Priority number one should be hardening and the safeguarding of access and data integrity of the Oracle database servers housed as the main office in Reston, VA. And separately at the San Diego satellite office A comprehensive security policy will be developed and approved by management that will detail the specific guidelines administrators must follow when allowed admin access to company IT resources and services, and when and how those permissions should be denied or allowed. Additionally, auditing and logging of critical events should be implemented utilizing a reliable SEIM (Security Information and Event Management) system. Moreover, control of user access from remote sites via the company intranet via VPN’s and remote access via RADIUS should be strengthened and monitored for both qualitative and quantitate analysis and measuring. Cryptographic techniques will be enhanced and login and password requirements will be strengthened. Of significant importance is the company web presence and corporate access to its knowledge base portal within the company intranet. The company web presence is of vital importance to allow customers to access information concerning the company’s products and services. The knowledge portal is vital for company employees to have access to propriety information while protecting their confidentiality, integrity, and availability of the data. We will separate and hardened both the web server and the knowledge portal via…

    • 2606 Words
    • 11 Pages
    Powerful Essays
  • Satisfactory Essays

    When specifying security policies for an enterprise, setting security on an individual-by-individual basis provides the tightest and most personalized security. The tradeoff, however, is the increased amount of administration effort in setting up the security and maintaining it on an ongoing basis. You have been brought in as a consultant from Smith Systems Consulting to advise Riordan Manufacturing on what it will take to establish adequate enterprise security policies. You will need to prepare a 3-5 page paper that highlights why they should establish separation of duties via role assignment and how this will provide safeguards to protecting the data in their information systems.…

    • 651 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Watch the Demo Lab in Learning Space Unit 2 and then answer each of the following questions.…

    • 559 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Richman Investment needs and new enterprise encryption strategy. This is for a more secure network. They are wanting to grow to 10,000 employees worldwide. Richman Investment wants to operate out of 20 different countries in the future. This is very easy to do but to have a secure network there are many things that would have to happen which will make this more difficult to do. Have a secure network takes a lot of work and has to be monitored 24 hours a day 7 days a week. There are many different ways to go about this topic the one I am going to pick is a public key infrastructure (PKI).…

    • 444 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    In the WAN domain, enforce encryption, and VPN tunneling for remote connections. Configure routers, and network firewalls to block Ping requests to reduce chance of Denial of Service attacks. Deployment of…

    • 386 Words
    • 2 Pages
    Satisfactory Essays
  • Better Essays

    Any information stored in an organisation has to follow the security and confidentiality procedures. Information security and confidentiality is the process where data is kept away from unauthorised access, disclosure, destruction, use or modification. It applies to both physical and electronic data. All organisations store a large amount of confidential information about their employees, customers, company’s status,…

    • 1681 Words
    • 7 Pages
    Better Essays
  • Good Essays

    NT2580 Project part 1

    • 606 Words
    • 3 Pages

    Safety of data and information is a real important aspect of a company. Before we can create an outline for general security solutions we must first define what is needed. I recommend that we use a multi-layered security plan. There are a total of seven domains of an IT infrastructure including user domain, workstation domain, LAN domain, LAN-to-WAN domain, WAN domain, remote access domain, and system/application domain.…

    • 606 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Protecting clients and company confidential information is of high importance, not only for the company and existing clients but also future clients.…

    • 270 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    unit 637

    • 297 Words
    • 2 Pages

    1.2. Explain the legal requirements and agreed ways of working for the security and confidentiality of information.…

    • 297 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    ERR task B

    • 933 Words
    • 3 Pages

    Data protection: never give out personal information about colleagues or service users to unauthorised people or organisations. Never disclose commercial information about company’s activities to unauthorised people or organisations. Keep all data secure and use my own log in and not share passwords. Any papers, CD’s, portable USB devices should be locked away whenever possible, cabinets and draws that contain sensitive…

    • 933 Words
    • 3 Pages
    Powerful Essays
  • Satisfactory Essays

    ABSs choice of a solution to the data protection and encryption problem is most likely directly related to the penalties that can be enforced against them for non-compliance of the laws. The Federal Trade Commission, state insurance authorities and other federal regulatory agencies have the power to enforce the Gramm-Leach-Bliley (GLB) Act which requires all financial, investment and insurance agencies to inform their customers of their information sharing procedures. The GLB Act also requires these agencies to safeguard their customer’s sensitive data and information. ABSs solution to safeguard their customer’s data and information is directly related to compliance of the GLB Act.…

    • 407 Words
    • 1 Page
    Satisfactory Essays
  • Good Essays

    Team C has identified that the Human Resources Department of Patton-Fuller Community Hospital has primary system deficiencies with the information security and lack of information. The records are currently open to all system users, exposing personal information to the Internet through the public website. The requirements for updating the Human Resources operating system have been identified using a specification checklist for updating software for the department including payroll and accounting. Team C has gathered the business requirements to understand the needs of the Human Resources department. The department currently operates on an Apple iMac with 2 gigahertz, 350-megabyte hard drive wireless with Mac OS X including Leopard and Windows XP. All patient files are encrypted for storage using AES. Advanced Encryption Standard is highly secure using 256-bit AES encryption for sensitive data. The Human Resource department also needs to have their sensitive data secure.…

    • 707 Words
    • 3 Pages
    Good Essays