ReviewEssays.com - Term Papers, Book Reports, Research Papers and College Essays
Search

Operating System

Essay by   •  November 28, 2010  •  Study Guide  •  474 Words (2 Pages)  •  1,183 Views

Essay Preview: Operating System

Report this essay
Page 1 of 2

PKI BUSINESS VALUE CASE

Background/Purpose

Using electronic methods, such as email, to securely communicate between agencies, departments, vendors, and UCOP will reduce the need for handling paper. All providers accept that they get and send a large amount of paper reports, letters, forms, and data. The problems with this communication are:

* certifying that the communication actually came from that person (student, staff, or faculty) or agency

* certifying that the communication cannot be read by anyone but the intended recipient

* certifying that the communication has not been tampered with

* filing of the communication for purposes such as audit trails, history,

PKI will help address these issues. The term "communication" is used in a broad sense and includes transaction-based communication between humans and machines, machines and machines, and messaging.

Business Objectives

What would PKI enable?

1) Improved security

* Authentication - and its scalability to a wide variety of uses.

* Confidentiality

* Secrecy/Encryption

* Proof that data integrity of document is not compromised

* Non-repudiation

* PKI-enabled smartcards

* Secured file transmission, replacing FTP

* S-MIME/SSL for email encryption end-to-end.

2) Digital Signatures for Workflow - we are already implementing workflow-based applications. Document approval currently manual.

3) Risk management

* If we don't do PKI, what will happen when asked to interface with agencies or service providers that require certificates?

* If we implement PKI, what else can we do that we can't do today?

* What about 5 year old documents and audits? How do we prove who acted and how?

4) Process simplification and operational cost reduction while improving customer service

* Single-signon simplifies the user experience

* Less helpdesk time on username/password management

* Simplification of network and application access administration

* More efficient physical access administration if smart cards are used with PKI.

* Improved disaster recovery - PKI VPN allows more secure remote access in case workers can't physical get to the campus.

* Customization of ASP or vendor solutions is unnecessary if an industry solution, such as PKI is available. Webauth, a solution used at UC Irvine is too proprietary to ask vendors to customize their authentication with.

5) Regulatory compliance - ie: Government regulations on secrecy, patent protection, HIPPA (Patient

...

...

Download as:   txt (3.7 Kb)   pdf (71.6 Kb)   docx (10.8 Kb)  
Continue for 1 more page »
Only available on ReviewEssays.com
Citation Generator

(2010, 11). Operating System. ReviewEssays.com. Retrieved 11, 2010, from https://www.reviewessays.com/essay/Operating-System/16211.html

"Operating System" ReviewEssays.com. 11 2010. 2010. 11 2010 <https://www.reviewessays.com/essay/Operating-System/16211.html>.

"Operating System." ReviewEssays.com. ReviewEssays.com, 11 2010. Web. 11 2010. <https://www.reviewessays.com/essay/Operating-System/16211.html>.

"Operating System." ReviewEssays.com. 11, 2010. Accessed 11, 2010. https://www.reviewessays.com/essay/Operating-System/16211.html.