Purchase Solution

What are symmetric and asymmetric cryptosystems that ABCs Network Security should know about?

Not what you're looking for?

Ask Custom Question

Scenario:

ABC company is a small but growing manufacturing company with revenues of approximately $25 million. Until now, the company has had a single headquarters and production facility in a Midwestern city, but it is building a separate sales office on the east coast which will open in a few months.

You are the Manager of IT at ABC, and you have been responsible for operating a basic set of computer applications in the Midwest office: order entry and fulfillment, financial and accounting systems, e-mail, and general office automation (word processing, etc.) You have been maintaining a Local Area Network connecting the office desktop computers to each other and to the applications running on the company servers, but there has been no access to these systems from outside the office.

You have been told by senior management that when the new sales office opens, the east coast staff must be able to enter new orders directly into the home office system using their desktop computers. They also need access to customer records and order status information. Furthermore, management wants to implement a new company website for customers to place orders online and to view their ordering history, current order status, and financial statement information without calling customer service.

You realize there are huge security implications implied by these changes. You have been uneasy in the past because the company has lacked a comprehensive computer security policy. Furthermore, most employees have not really understood all the security issues in the old "internal" computing environment. The new configuration with its networked offices and Internet-accessible elements will require more security awareness than ever. You see this as your opportunity, and imperative, to move the company to accept a formal corporate security standard. In the weeks ahead, you will begin to educate both management and system users regarding the components, necessity, and use of security standards for all of the new technologies that will be used, as well as for the current technology they have been using. In the end, you will develop all of this together into a complete corporate security program proposal.

Research the principles of symmetric and asymmetric encryption systems as well as the concepts of certificates and the Public Key Infrastructure. Then, post your opinions on the following to the Small Group Discussion Board:

What are symmetric and asymmetric cryptosystems?
What are the advantages and disadvantages of symmetric vs. asymmetric cryptosystems?
In what situations do you feel each (asymmetric encryption and symmetric encryption) should be used?
What are the roles played by Certificates and the PKI in the encryption process?

Please Post References

Purchase this Solution

Solution Summary

This solution discusses ABC's Network Security and the principles of symmetric and asymmetric encryption systems in 455 words.

Solution Preview

What are symmetric and asymmetric cryptosystems?

In symmetric cryptosystems, the encryption and decryption of the message is done using the same key known as private key. In asymmetric cryptosystems, a pair of keys known as public and private key is used for encryption and decryption.

What are the advantages and disadvantages of symmetric vs. asymmetric cryptosystems?

The main advantage of symmetric cryptosystems is speed of encryption whereas the main disadvantage is the management or administration of keys.

The simplicity of key administration is considered the major advantage of asymmetric cryptosystems whereas slowness of encryption is the major disadvantage.

In what situations do you feel each (asymmetric encryption and symmetric encryption) should be used?

The east coast staff must be able to enter new orders directly ...

Solution provided by:
Education
  • BCom, SGTB Khalsa College, University of Delhi
  • MBA, Rochester Institute of Technology
Recent Feedback
  • "Thank you. "
  • "Thank you"
  • "Thank you. I got 20/20 last week for my discussion you help me out with."
  • "Thank you. Great Job. "
  • "Thank you. Great Job. "
Purchase this Solution


Free BrainMass Quizzes
Transformational Leadership

This quiz covers the topic of transformational leadership. Specifically, this quiz covers the theories proposed by James MacGregor Burns and Bernard Bass. Students familiar with transformational leadership should easily be able to answer the questions detailed below.

Managing the Older Worker

This quiz will let you know some of the basics of dealing with older workers. This is increasingly important for managers and human resource workers as many countries are facing an increase in older people in the workforce

Cost Concepts: Analyzing Costs in Managerial Accounting

This quiz gives students the opportunity to assess their knowledge of cost concepts used in managerial accounting such as opportunity costs, marginal costs, relevant costs and the benefits and relationships that derive from them.

Operations Management

This quiz tests a student's knowledge about Operations Management

Lean your Process

This quiz will help you understand the basic concepts of Lean.