Need Help ?

Home >> Samples >> CYB-300 System and Comm Security >> CYB 300 : 5-2 Milestone Three: PKI, FSDP, and CIA

CYB 300 : 5-2 Milestone Three: PKI, FSDP, and CIA ...


CYB 300 : 5-2 Milestone Three: PKI, FSDP, and CIA

PKI, FSDP, and CIA

Overview

In previous coursework, you have explored the Fundamental Security Design Principles (FSDP) and the confidentiality, integrity, and availability (CIA) triad. It is important that we correlate how public key infrastructure (PKI) and these security controls interact with each other. When you examine the FSDPs and explain how they interact with PKI and the CIA triad, you develop analysis skills that enhance your skill set as a security analyst. A key takeaway from this assignment is a playbook-worthy artifact that encourages you to synthesize ideas on how security methodologies can be taken to the next level. It is important that we use frameworks like the FSDP and the CIA triad as they apply to contemporary topics; this will help you develop the next generation of protections that are found in industry security practices.

The purpose of this assignment is to prepare you to discuss the FSDPs in your final project, which will be submitted in Module Seven.

Prompt

Complete the table and answer the short- response questions in your Milestone Three Worksheet, which is linked in the milestone assignment in Module Five of your course. You must address the critical elements listed below.

  1. Security Analysis Table: Complete the table by filling in the columns for the following FSDPs. Describe how they relate to PKI and the CIA triad.
    1. Isolation
    2. Modularity
    3. Minimization of Implementation
    4. Layering
    5. Least Privilege
    6. Fail-Safe Defaults/Fail Secure
    7. Trust Relations
  2. Scenario-Based Short Response Questions
    1. Temporary Contractor: The use of certificates of authority (CAs) as part of PKI provides a mechanism for key management and secure communications. If you were asked to provide access to information systems to a temporary contractor, what areas of a PKI and CIA triad would you be concerned with? Which of the FSDPs most applies here?
    2. Cryptography: As part of PKI, a cryptographic system is established. Explain how cryptography is used and what forms of implementation can be accomplished.

CYB 300 Milestone Three Worksheet

 

  1. Security Analysis Table

Security Analysis Table

Fundamental Security Design Principles

Describe how the FSDPs relate to PKI (2–3 sentences)

Describe how the FSDPs relate to the CIA triad (2–3 sentences)

Isolation

 

 

Modularity

 

 

Minimization of Implementation

 

 

Layering

 

 

Least Privilege

 

 

Fail-Safe Defaults/Fail Secure

 

 

Trust Relations

 

 

 

  1. Scenario-Based Short Response Questions
    1. Temporary Contractor: The use of CAs as part of PKI provides a mechanism for key management and secure communications. If you were asked to provide access to information systems to a temporary contractor, what areas of a PKI and CIA triad would you be concerned with? Which of the FSDPs most applies here?
    1. Cryptography: As part of PKI, a cryptographic system is established. Explain how cryptography is used and what forms of implementation can be accomplished.

 

 






We have an Answer from Expert

View Expert Answer

Expert Answer


Answer: CYB 300 : 5-2 Milestone Three: PKI, FSDP, and CIA

We have an Answer from Expert

Buy This Answer $5

Need your Own Custom Solution?

Order with full confidence and you will be amazed by our results

It’s pretty straightforward, but if you get stuck at any step, please feel free to contact us at any time for a chat.

WhatsApp support@gradegivers.com

NEED A UNIQUE PAPER ON THE ABOVE DETAILS?
Order Now
WhatsApp