IT Security Assignment
IT Security Assignment
IT Security Assignment
INTE/NE /0816/05/16
IT SECURITY
Assignment 2
What are the risks in the Kenyan government's selecting a cryptosystem for
widespread commercial use (both inside and outside Kenya)? How could users from
outside Kenya overcome some or all of these risks?
1. Key lifetime- key lifetime may be risky in that the key shared to decript the
information ma expire before being used
2. Randomness of Generated Keys- To prevent key generation from being
predictable, keys must be generated randomly. However, keys that are
generated by computer software are never generated in a truly random
manner
3. Public Key Length- Given a key of the same length, public key cryptography
generally is more susceptible to attack than symmetric key cryptography,
particularly to factoring attacks
4. Strength of the Security Protocols- Cryptography-based security technologies
are implemented by using security protocols. For example, secure mail
systems can be implemented by using the S/MIME protocol, and secure
network communications can be implemented by using the IPSec suite of
protocols. Likewise, secure Web communications can be implemented by
using the TLS protocol.
Benefit /ways of overcoming the stated risk associated with the cryptosystem is:
1. Ensure guaranteed access to encrypted data by authorized users by
automating storage and back-up for mission critical master encryption keys.
2. Simplify data privacy compliance obligations and reporting activities through
the use of a security-certified encryption and key management to enforce
critical best practices and other standards of due care.
3. Enforce separation of duties by isolating master encryption keys from
encrypted data-reducing the threat of insider attacks.
4. Maximize efficiency by reducing administration costs associated with
managing keys in large-scale database environments with Thales’ industry-
leading Security World key management architecture.
5. Deploy with confidence and accelerate implementation projects; Thales
HSMs integrate easily with leading database management systems, featuring
out-of-the-box integration with Transparent Data Encryption from Microsoft,
and integration with other leading DBMS solutions via technology partners
including Voltage and Prime Factors.