CYB 300 : 5-2 Milestone Three: PKI, FSDP, and CIA ...
PKI, FSDP, and CIA
Overview
In previous coursework, you have explored the Fundamental Security Design Principles (FSDP) and the confidentiality, integrity, and availability (CIA) triad. It is important that we correlate how public key infrastructure (PKI) and these security controls interact with each other. When you examine the FSDPs and explain how they interact with PKI and the CIA triad, you develop analysis skills that enhance your skill set as a security analyst. A key takeaway from this assignment is a playbook-worthy artifact that encourages you to synthesize ideas on how security methodologies can be taken to the next level. It is important that we use frameworks like the FSDP and the CIA triad as they apply to contemporary topics; this will help you develop the next generation of protections that are found in industry security practices.
The purpose of this assignment is to prepare you to discuss the FSDPs in your final project, which will be submitted in Module Seven.
Prompt
Complete the table and answer the short- response questions in your Milestone Three Worksheet, which is linked in the milestone assignment in Module Five of your course. You must address the critical elements listed below.
Security Analysis Table: Complete the table by filling in the columns for the following FSDPs. Describe how they relate to PKI and the CIA triad.
Isolation
Modularity
Minimization of Implementation
Layering
Least Privilege
Fail-Safe Defaults/Fail Secure
Trust Relations
Scenario-Based Short Response Questions
Temporary Contractor: The use of certificates of authority (CAs) as part of PKI provides a mechanism for key management and secure communications. If you were asked to provide access to information systems to a temporary contractor, what areas of a PKI and CIA triad would you be concerned with? Which of the FSDPs most applies here?
Cryptography: As part of PKI, a cryptographic system is established. Explain how cryptography is used and what forms of implementation can be accomplished.
CYB 300 Milestone Three Worksheet
Security Analysis Table
Security Analysis Table
Fundamental Security Design Principles
Describe how the FSDPs relate to PKI (2–3 sentences)
Describe how the FSDPs relate to the CIA triad (2–3 sentences)
Isolation
Modularity
Minimization of Implementation
Layering
Least Privilege
Fail-Safe Defaults/Fail Secure
Trust Relations
Scenario-Based Short Response Questions
Temporary Contractor: The use of CAs as part of PKI provides a mechanism for key management and secure communications. If you were asked to provide access to information systems to a temporary contractor, what areas of a PKI and CIA triad would you be concerned with? Which of the FSDPs most applies here?
Cryptography: As part of PKI, a cryptographic system is established. Explain how cryptography is used and what forms of implementation can be accomplished.