Cryptography is the application of algorithms to ensure the confidentiality, integrity, and availability of data, while it is at rest, in motion, or in use. Cryptography systems can include local encryptions at the file or disk level or databases. Cryptography systems can also extend to an enterprise-wide public key infrastructure for whole agencies or corporations. The following are the deliverables for this project: Deliverables Enterprise Key Management Plan: An eight- to 10-page double-spaced Word document with citations in APA format. The page count does not include figures, diagrams, tables, or citations. Enterprise Key Management Policy: A two- to three-page double-spaced Word document. Lab Report: A Word document sharing your lab experience along with screenshots. There are seven steps to complete the project. Most steps of this project should take no more than two hours to complete. The entire project should take no more than one week to complete. Begin with the workplace scenario, and then continue to Step 1, “Identify Components of Key Management.” When you submit your project, your work will be evaluated using the competencies listed below. You can use the list below to self-check your work before submission. Step 1: Identify Components of Key Management Key management will be an important aspect of the new electronic protected health information (e-PHI). Key management is often considered the most difficult part of designing a cryptosystem. Choose a fictitious or an actual organization. The idea is to provide an overview of the current state of enterprise key management for Superior Health Care. Review these authentication resources to learn about authentication and the characteristics of key management. Provide a high-level, top-layer network view (diagram) of the systems in Superior Health Care. The diagram can be a bubble chart or Visio drawing of a simple network diagram with servers. Conduct independent research to identify a suitable network diagram. Read these resources on data at rest , data in use, and data in motion . Identify data at rest, data in use, and data in motion as it could apply to your organization. Start by focusing on where data are stored and how data are accessed. Review these resources on insecure handling, and identify areas where insecure handling may be a concern for your organization. Incorporate this information in your key management plan. In the next step, you will consider key management capabilities. Step 3: Identify Key Management Gaps, Risks, Solutions, and Challenges In the previous step, you identified the key components of an enterprise key management system. In this step, you will conduct independent research on key management issues in existing organizations. You will use this research to help identify gaps in key management, in each of the key management areas within Superior Health Care. Conduct independent research to identify typical gaps in key management within organizations. Incorporate and cite actual findings within your key management plan. If unable to find data on real organizations, use authoritative material discussing typical gaps. Identify crypto attacks and other risks to the cryptographic systems posed by these gaps. Read these resources to brush up on your understanding of crypto attacks . Propose solutions organizations may use to address these gaps and identify necessary components of these solutions. Finally, identify challenges, including remedies, other organizations have faced in implementing a key management system. Include this information in your enterprise key management plan. Provide a summary table of the information within your key management plan. Incorporate this information in your implementation plan. Step 4: Provide Additional Considerations for the CISO You have satisfactorily identified key management gaps. Incorporate these additional objectives of an enterprise key management system as you compile information for the C…

Looking for solution of this Assignment?


We deliver quality original papers

Our experts write quality original papers using academic databases.We dont use AI in our work. We refund your money if AI is detected  

Free revisions

We offer our clients multiple free revisions just to ensure you get what you want.

Discounted prices

All our prices are discounted which makes it affordable to you. Use code FIRST15 to get your discount

100% originality

We deliver papers that are written from scratch to deliver 100% originality. Our papers are free from plagiarism and NO similarity.We have ZERO TOLERANCE TO USE OF AI

On-time delivery

We will deliver your paper on time even on short notice or  short deadline, overnight essay or even an urgent essay