Preview

PKI and Encryption at Work

Good Essays
Open Document
Open Document
575 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
PKI and Encryption at Work
PKI and Encryption at Work

The Quality Medical Company is interested in expanding its ability to obtain more customers/clients through the Quality Medical Company’s internet presence. Quality Medical Company should consider the use PKI (Public Key Infrastructure) and Encryption to achieve a competitive and compliance advantage. Entities can have one or more private-public key pairs and associated public key certificates. A certificate is a statement issued by a certification authority according to a policy that binds an entity 's public key to its name for a period of time. (You 'll learn more about policies later in the chapter.) Another entity that trusts this CA also trusts that the public key belongs to the named entity. When entity A is presented with a certificate by entity B, entity A can tell from the certificate name that the certificate belongs to a legitimate user of the system. Entity B proves he or she is the legitimate holder of the certificate by proving his or her knowledge of the associated private key. Entity A can optionally check the certificate 's current validity by looking it up on the CA 's CRL.
Furthermore, entities A and B can now use end-to-end confidentiality and integrity services without the cooperation of any third entity. For example, users can exchange secure e-mail and securely access Web content on an intranet. Another advantage is that private keys are typically 1024-bit-long strings and cannot be guessed the way that passwords can. Therefore, you can use certificates for strong authentication.
The Quality medical Company will have to comply with several laws and regulations, such as the Sarbanes-Oxley Act (SOX), the Gramm-Leach-Bliley Act (GLBA), the Health Insurance portability act (HIPAA) and Personally Identifiable Information (PII), to comply with public company regulations and compliance laws the Quality Medical Company should consider the use of encrypting data and the following steps and these are the same steps



References: Ballad, B. Ballad, T. and Banks, Erin. Access Control, Authentication, and Public Key Infrastructure. 2011. Jones and Bartlett Learning

You May Also Find These Documents Helpful

  • Better Essays

    (2015), lauded the benefits of EHR to increase, substantially the quality of health care and its effectiveness in reducing cost. However, they listed these as ethical possibilities: privacy and confidentially, security and data inaccuracies. In order to ensure compliance, there will be appropriate administrative, technical, and physical safeguards in place. This will prevent the disclosure of protected health information, For example, shredding documents containing protected health information before discarding them, securing medical records with lock and key, using or pass code, and limiting access to only those who function requires the…

    • 1361 Words
    • 6 Pages
    Better Essays
  • Satisfactory Essays

    is3230 week1 assgnmnt1

    • 362 Words
    • 3 Pages

    References: Ballad, Bill, Tricia Ballad, and Erin K. Banks. 2011. Access Control, Authentication, and Public Key Infrastructure. Sudbury: Jones & Bartlett Learning.…

    • 362 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    Cmgt/554 Week 2

    • 1453 Words
    • 6 Pages

    A major goal of the hospital is to protect the personal information of the patients who fall under the guidelines of the Health Insurance Portability and Accountability Act (HIPAA). HIPAA requires the protection and confidential handling of protected health information ("Health Insurance Portability And Accountability Act", 2012). To make sure that standards are meet, Patton-Fuller uses an encrypted storage system known as Advanced Encryption Standard (AES) (Apollo Group, 2011). According to "Encryption…

    • 1453 Words
    • 6 Pages
    Good Essays
  • Satisfactory Essays

    Foremost in compiling a health care risk assessment will be to ensure all methodologies take into account compliance of the U.S. Health Insurance Portability and Accountability Act (HIPAA) of 1996. The healthcare provider must comply with the HIPAA Privacy and Security Rules in order to avoid penalties.…

    • 311 Words
    • 1 Page
    Satisfactory Essays
  • Powerful Essays

    Kim, D. & Solomon, M. G. (2012). Fundamentals of information systems security . Sudbury, MA: Jones & Bartlett Learning, LLC.…

    • 2582 Words
    • 11 Pages
    Powerful Essays
  • Good Essays

    PKI Paper

    • 801 Words
    • 3 Pages

    In a single service package, a commercial PKI provides reliability, support, and indemnification over in-house PKI solution. Commercial PKI offerings are relatively well-tested…

    • 801 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    Hrm/531 Week 1

    • 2047 Words
    • 9 Pages

    Training sessions will be organized for all employees at least once a year to refresh their knowledge of privacy and security in compliance to with Health Insurance Portability and Accountability Act (HIPAA) rules. HIPAA Privacy and Security Rule set a national standard for the security and privacy of electronic protected health information; and the confidentiality provisions of the Patient Safety Rule. The US Department of Health and Human Services (2010) stated, “the Rule requires appropriate safeguards to protect the privacy of personal health information, and sets limits and conditions on the uses and disclosures that may be made of such information without patient authorization” (¶…

    • 2047 Words
    • 9 Pages
    Powerful Essays
  • Powerful Essays

    "Clearinghouses," and healthcare providers must conform: Administrative simplification, which calls for use of the same computer language industry-wide; Privacy protection, which requires healthcare providers to take reasonable measures to protect patients' written, oral, and electronic information. Congress passed HIPAA in an effort "to protect the privacy and security of individually identifiable health information.” Additionally, lawmakers "sought to reduce the administrative costs and burden associated with healthcare by standardizing data and facilitating transmission of many administrative and financial transactions." HIPAA consultants say the new regulations should save the healthcare industry money in the long run, provide improved security of patient information, and allow patients to have better access to their own healthcare information. The HIPAA law is a multi-step approach that is geared to improve the health insurance system. One approach of the HIPAA regulations is to protect privacy. It is also known as the law to treat the sick, or injured regardless of the fact whether they are able to pay. The provisions that are included in the HIPAA law are provisions for…

    • 1281 Words
    • 6 Pages
    Powerful Essays
  • Good Essays

    Case Project

    • 650 Words
    • 3 Pages

    Keys form the basic foundation for public key infrastructure and it is important that each key be carefully handled. The proper management of keys includes key storage, key usage, and key-handling procedures. There are different ways to store keys; public keys can be stored by embedding the key within digital certificates, while private keys can be stored on a person’s personal computer. However, there are drawbacks to storing keys using software; software can leave openings for an…

    • 650 Words
    • 3 Pages
    Good Essays
  • Good Essays

    ABC institute will want to email back and forth with XYZ Inc. They can manage this with using asymmetric keys. The sender will simply type the desired message and then use the public key of the person they wish to send the message for encrypting and therefore securing the message to be sent over the very public internet. Having done this the only person who could possibly open and read this email would be the desired recipient. This is insured because since their public key was used to encrypt, the only way to decrypt the message into a readable email is by using the recipient’s private key which only they have access to.…

    • 509 Words
    • 2 Pages
    Good Essays
  • Better Essays

    Define the following terms. Your definitions must be in your own words; do not copy them from the textbook.…

    • 1436 Words
    • 6 Pages
    Better Essays
  • Better Essays

    We Can But Dare We

    • 2030 Words
    • 6 Pages

    Due to the sensitive nature of the information kept by healthcare providers about their patients, principles were put in place to reduce the risk of breeching patient privacy. The Health Insurance Portability and Accountability Act of 1996 (HIPAA) set national standards and regulations regarding the protection of patients’ privacy and personal health information (U.S. Department of Health and Human Services [HHS], n.d.). Under The Privacy Rule enacted by HIPAA, protection is governed over all,…

    • 2030 Words
    • 6 Pages
    Better Essays
  • Satisfactory Essays

    Public Key Encryption

    • 330 Words
    • 2 Pages

    When you make a request to visit a website, that request must pass through many different networks. Any of these networks could be used to potentially eavesdrop or tamper with your connection. If a malicious user got into any one of those systems, then they have the potential to see what’s traveling through the wire. Normally, web requests are sent over regular HTTP, where a client’s request and the server’s response are both sent as plain text.…

    • 330 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    The Rsa Algorithm

    • 5348 Words
    • 22 Pages

    In 1978, Ron Rivest, Adi Shamir, and Leonard Adleman introduced a cryptographic algorithm, which was essentially to replace the less secure National Bureau of Standards (NBS) algorithm. Most importantly, RSA implements a public-key cryptosystem, as well as digital signatures. RSA is motivated by the published works of Diffie and Hellman from several years before, who described the idea of such an algorithm, but never truly developed it. Introduced at the time when the era of electronic email was expected to soon arise, RSA implemented two important ideas: 1. Public-key encryption. This idea omits the need for a “courier” to deliver keys to recipients over another secure channel before transmitting the originally-intended message. In RSA, encryption keys are public, while the decryption keys are not, so only the person with the correct decryption key can decipher an encrypted message. Everyone has their own encryption and decryption keys. The keys must be made in such a way that the decryption key may not be easily deduced from the public encryption key. 2. Digital signatures. The receiver may need to verify that a transmitted message actually originated from the sender (signature), and didn’t just come from there (authentication). This is done using the sender’s decryption key, and the signature can later be verified by anyone, using the corresponding public encryption key. Signatures therefore cannot be forged. Also, no signer can later deny having signed the message. This is not only useful for electronic mail, but for other electronic transactions and transmissions, such as fund transfers. The security of the RSA algorithm has so far been validated, since no known attempts to break it have yet been successful, mostly due to the difficulty of factoring large numbers n = pq, where p and q are large prime numbers.…

    • 5348 Words
    • 22 Pages
    Good Essays
  • Better Essays

    Electronic commerce uses technology such as digital signatures and public key encryption to establish authenticity and non-repudiation.…

    • 1955 Words
    • 8 Pages
    Better Essays