Based on the security objectives in the following table, design an enterprise encryption strategy-a public key infrastructure (PKI) that supports internal employees, external business partners, and clients. Include the design and reasoning for using the selected encryption strategy. Have a secure network takes a lot of work and has to be monitored 24 hours a day 7 days a week. There are many different ways to go about this topic the one I am going to pick is a public key infrastructure (PKI).
One security options that can be used is the Privacy or confidentiality. Using this will help keep information confidently from others or outsiders unless you are authorized. This will keep employees from finding things such as SSN (social security numbers), personal home address, and/or documents that may be considered sensitive. Having this as a security option is an all-around good idea. I would implement
...this on all of the networks/domains that I would manage. This PKI card will give access to the following:
•Entrance to buildings
•Access to specific areas of the building (depending on title)
•The ability to open encrypted messages/email
•The ability to sign-in/log-off of your company pc
•Punch-in and Punch-out of time clock
•Specific access to certain applications and folders
All new employees must fill-out proper paperwork given by the building security team. After that paperwork has been filled-out, a picture will be taken to place onto the card. The same process will follow if your PKI card is lost. The PKI card will roll out in 30 days, once your card is received please follow the instructions given
to activate the card. The PKI cards will differentiate between the U.S. and foreign countries, but security policies will work within the United States at every location.
Any other personnel will receive a “Visitors” badge for temporary access. There are a number of many different features to implement on these networks that are as good as the ones listed above. Many work better when combined with other security features. In my opinion I think these listed above are a good starting point and Richman Investment will befit from these being implemented into their new secure network. Once these have been implemented, Richman Investments can decide what else they may want to add on
- Android essays
- Application Software essays
- Benchmark essays
- Computer Network essays
- Computer Programming essays
- Computer Security essays
- Computer Software essays
- Cryptography essays
- Data collection essays
- Data Mining essays
- Graphic Design essays
- Information Systems essays
- Internet essays
- Network Security essays
- Website essays
- World Wide Web essays
- Animal Cruelty essays
- Charles Manson essays
- Crime Prevention essays
- Crime scene essays
- Criminal Justice essays
- Criminology essays
- Cyber Crime essays
- Damages essays
- Detention essays
- Distracted Driving essays
- Drug Trafficking essays
- Drunk Driving essays
- Forensic Science essays
- Gang essays
- Hate Crime essays
- Homicide essays
- Identity Theft essays
- Juvenile Crime essays
- Juvenile Delinquency essays
- Juvenile Justice System essays
- Law Enforcement essays
- Murder essays
- Organized Crime essays
- Penology essays
- Piracy essays
- Prison essays
- Property Crime essays
- Prostitution essays
- Punishment essays
- Punishments essays
- Rape essays
- Robbery essays
- Serial Killer essays
- Sexual Assault essays