Confidentiality Essay

1238 words - 5 pages

Confidentiality, Integrity, Authentication, and Nonrepudiation.
Carlos F Rentas
Strayer University
CIS 333
November 17, 2012
Prof. Jonathan C. Thrall

Working as an Information Security Officer, our firm was task for a client who is small software company currently using a Microsoft Server 2008 Active Directory domain and is administered by a limited number of over-tasked network administrators. The rest of the client’s staff is mostly software developers and a small number of administrative personnel. The client has decided that it would be in their best interest to use a public key infrastructure (PKI) to provide a framework that facilitates confidentiality, integrity, ...view middle of the document...

It uses a pair of mathematically related cryptographic keys. When one key is used to encrypt information, then only the related key can decrypt the same. If only one of the keys is known, then the other key becomes extremely difficult to calculate, resulting in the following:
* A public key. This is something made public, freely distributed and it can be seen by all users.
* A corresponding (and unique) private key. This is kept secret and not shared among users.
A private key enables a user to prove, without any doubt, who they claim to be.

Positive and negative characteristics of a Public and In-house CA.
Some of the expected advantages of a PKI infrastructure comes as;
* Ensuring the quality of information electronically sent and received
* Ensuring the authenticity of the source and destination of the information,
* Provided the source of time is known, the assurance of the time and timing of the information
* Ensuring information’s privacy
* Information’s authenticity that may be introduced as evidence in court
In a network that’s used to issue and manage security credentials and public keys for the encryption of messages, a CA is the authority. In a public key infrastructure, a CA verifies with a RA checks with (registration authority) (RA) and checks the information provided by whoever request a digital certificate. The CA issues a certificate once the RA verifies the requestor’s information. Depending on the public key infrastructure implementation, the certificate includes the owner’s name, the owner's public key, expiration date of the certificate, and any other public key owner information such as;
* Cryptography
In a Public Key system, communication is asymmetric, the sender and receiver do not need a common key to send encrypted messages. The sender needs however to know the receiver's public key so the message can be sent. However for that communication to stay private, the receiver needs to keep the sender's private key confidential.
* Trust
Due to its asymmetric encryption, communication in a PKI infrastructure should be secure. When an individual or companies make false representations or assume false identity is when problems arise, allowing confidential data to fall into unauthorized hands.
* Certificate Authority
In a website holding public keys, these are trusted third parties who verify identities. These contain names, addresses, phone numbers and other information subject to be verified in order to determine if the entity is legitimate. Some of these certificates issued provide an additional encryption known as Secure Socket Layer (SSL) making communication secure.

Recommendation for either a Public CA or an In-house CA.
Security has become a priority for companies over the last few years, and many administrators that have probably never thought twice about digital certificates are...

Other Papers Like Confidentiality

Confidentiality and Informed Consent Essay

1081 words - 5 pages Confidentiality and Informed Consent Claudia Lewis PSY/305 6/29/15 Dr. Daniel Williams Jr, PsyD, MSW Confidentiality and Informed Consent Introduction Dear client this paper is to inform you, of your right to confidentiality, and further more explain the process of informed consent. In the world of Psychology and counseling, confidentiality and informed consent has been the cornerstone to our practices (University of Phoenix, 1994

Ethical Complications Breach in Confidentiality Essay

2114 words - 9 pages The essay will define confidentiality its importance to nurses as a profession and the Nursing and Midwifery Code of Professional Conduct. It will further look at possible dilemmas that could arise in course of practice between the nurse colleagues and the clients. Examples will be based on my clinical placement 1 at Blackfriars Work Centre. Confidentiality is keeping secret, the shared information depending on the situation arising. Dimond

Discuss The Importance Of Confidentiality

1728 words - 7 pages Discuss the importance of confidentiality and this statement from the NursingMidwifery Council,"as a Registered Nurse, Midwife or Health Visitor, you are personallyaccountable for your practice. In caring for patients and clients, you mustprotect confidential information", ( NMC, 2002 ).The author of this essay is a student nurse who has recently completed their first clinical placement. The placement was a day hospital for people over the age

Importance of Confidentiality in Group Counseling

1085 words - 5 pages The Importance of Confidentiality in a Group and Ensuring Confidentiality Within and Outside of a Group Format Christina M. Bell Camden County College The purpose of this paper is to explain the importance of confidentiality in group counseling. Additionally this paper will discuss how a counselor can ensure confidentiality within and outside of a group format. Importance of Confidentiality in a Group Confidentiality in group counseling is

Security and Confidentiality on the Internet

922 words - 4 pages Security and Confidentially on the Internet Introduction The Internet provides little protection of security or confidentiality. The use of firewalls (protects both incoming and outgoing communications) and encryption can help limit the risks. I will discuss below the topics of how security and confidentially affects us in our everyday lives. Cookies Cookies provide enhancements that make the Web easier to use. Most major sites use them

Security, Confidentiality And International Issues In Real Estate

2733 words - 11 pages All businesses have to guarantee some sort of security and confidentiality to their clients as well as for their staff. E-Business security and confidentiality mean more than if the business was in a brick and mortar building. There needs to be secure websites for the client to transmit information to the business and the client needs to feel confident that the business will not sell their confidential information or lose it somewhere in their

Protecting Clients from Harm Through Ethical Codes, Informed Consent and Confidentiality

2686 words - 11 pages Protecting Clients from Harm through Ethical Codes, Informed Consent and Confidentiality Cydne-Ann A. Grobri Liberty University Abstract One of the primary reasons for the creation and use of ethical codes within helping professions is to educate the professional about acceptable ethical behavior and to protect the well-being of clients. The Code of Ethics of the National Association of Social Workers (2008) illuminates that the code

Applying Ethical Frameworks in Parctice

1040 words - 5 pages encounters with different types of patients, several types of families and varied situations. Every patient has certain rights and a nurse has to respect them in both legal and ethical aspects. Confidentiality is important to create confidence between nurses and patients. Without promising privacy to their matters, patients will be hesitant to share important information to health care professionals which may be necessary for their care. Respecting

Med Law and Bio Ethics

610 words - 3 pages records. Not even if it is just for a phone number to contact the patient about their prescriptions and aftercare instruction sheet. Professional silence and secure data management are the two ways that a health care professional can achieve confidentiality for their patient at hand. • In this case, how would you be able to correct your error and provide the missing documents and instructions to the patient while still protecting patient

Citi Program

748 words - 3 pages Question 1: Data are made anonymous by Your answer: Requiring all members of the research team to sign confidentiality agreements. Correct Answer: Destroying all identifiers connected to the data. Comment: Reporting data in aggregate form, while protecting the identity of subjects, does not make the data anonymous. Keeping keys in secure locations and requiring members of the research team to sign confidentiality agreements are methods

Ethical Frameworks

1072 words - 5 pages Applying Ethical Frameworks in Practice Richard Doria Grand Canyon University NRS -437 V Nov 16, 2014 Applying Ethical Frameworks in Practice Patient confidentiality can be often breached without the intention of doing it. This happens when staff discusses patient information in crowds or small groups, patient notes on the computer being left open and unattended, and documents that are not being filed properly and stay visible to the

Related Essays

Confidentiality Essay

624 words - 3 pages Confidentiality Procedure Purpose of Policy Little Dreams Nursery is committed to keeping information about children, parents and carers and staff as confidential as possible. At Little Dreams Nursery we respect every parent and child's rights to confidentiality; with this in mind would all parents please be aware of the following points. Who is Responsible It is the responsibility of all members of staff to ensure that all confidential

Confidentiality Essay

776 words - 4 pages CONFIDENTIALITY AGREEMENT This CONFIDENTIALITY AGREEMENT ("Agreement") is made on the 21st May of 2012. BETWEEN STA PHARMA LIMITED, hereinafter referred to as ‘The Company’ (which expression shall unless excluded by or repugnant to the context mean and include its successors-in-interest, legal representatives, executors, administrators and assignees) of the FIRST PART. AND INVESTMENTS LIMITED, hereinafter referred to as

Confidentiality Essay

738 words - 3 pages Assess how own attitudes, values and behaviour could impact on work with children and young people All those working in the school have a legal duty to protect the rights of children and young people. It is important that you examine your own attitudes and values critically, to consider how these may impact on the way you work with children. An individual’s background, upbringing and experiences can have an effect on attitudes towards

Ethical Decisions And Confidentiality Essay

999 words - 4 pages Running Head: ETHICS AND CONFIDENTIALITY Ethical Decisions for Confidentiality Ethical Decisions for Confidentiality Describing ethical dilemmas are often confused with the concept of right and wrong. Many people think that an immoral decision contradicts the understanding of ethics. Ethical dilemmas do not involve right or wrong, but they test the perception of acceptability based on morals and values. Ethics do not rely upon