d2 Roles of a Information Security Officer

You are the Information Security Officer at a small software company. The organization currently utilizes a
Microsoft Server 2008 Active Directory domain administered by a limited number of over-tasked network
administrators. The remainder of the organization comprises mostly software developers and a relatively small
number of administrative personnel. The organization has decided that it would be in its best interest to use a
public key infrastructure (PKI) to provide a framework that fosters confidentiality, integrity, authentication,
and nonrepudiation. Email clients, virtual private network products, Web server components, and domain controllers
would utilize digital certificates issued by the certificate authority (CA). Additionally, digital certificates
would be used to sign software developed by the company to demonstrate software authenticity to the customer.

1. Identify and analyze the fundamentals of PKI.
2. Analyze positive and negative characteristics of a Public and In-house CA.
3. Provide a sound recommendation for either a Public CA or an In-house CA.

• Explain how businesses apply cryptography in maintaining information security.
• Use technology and information resources to research issues in information systems security.
• Write clearly and concisely about network security topics using proper writing mechanics and technical style  conventions.



© 2020 customphdthesis.com. All Rights Reserved. | Disclaimer: for assistance purposes only. These custom papers should be used with proper reference.