Question

In: Computer Science

Case: Northridge Security Consultants, a security consulting company that specializes in network security for businesses, has...

Case: Northridge Security Consultants, a security consulting company that specializes in network security for businesses, has been using you as an outside contractor to provide research and customer service for their clients.

A landscaping business, Sunset Landscapers, has contracted with NSC to help them implement cryptography to protect all documents and transmissions throughout their network. They have over twenty locations nationwide. NSC has found that even though the company would like this technology, the IT Director is resistant to any significant changes. Create a document that can be presented to the company directors explaining cryptography, including hashing, symmetric and asymmetric cryptography, digital signatures, digital certificates, and PKI.

After meeting with you and reading your report, the IT Director at Sunset Landscapers indicates that he is considering using Microsoft BitLocker software but is unsure if it will provide sufficient security. Northridge has asked you to create a document that outlines the advantage and disadvantages of Microsoft BitLocker. How it is implemented and what the alternatives are in providing security?

Solutions

Expert Solution

explaining cryptography, including hashing, symmetric and asymmetric cryptography, digital signatures, digital certificates, and PKI.

Cryptography is mechanism of converting plain information in form of texts, data, image etc. into ciphered form using set of algorithms and mathematical functions.

1.            Symmetric encryption: In this type of cryptography both the sender and the

recipient use the same key. So same key is used for the encryption

function and the decryption function to transport into plain text into the

ciphertext and then ciphertext back into the plain text again.

2. Asymmetric/ Public Key Cryptography:

In this type of encryption, different keys are used. Here both the sender and the recipient have different keys that are used for the encryption and the decryption function. The sender is the only one who

knows the encryption key, and the recipient is the only person who knows the decryption key. This mechanism is faster and more suitable for large organization with large head count.

3. Digital Signatures:

Digital signatures are the public-key primitives of message authentication. It is a technique in which a person/entity binds to the digital data. This binding can be independently verified by receiver as well as any third-party source.

It is a cryptographic value that is calculated from the data and a secret key known only to the signer.

4. Digital certificates:

A digital certificate is a digital credential that provides information about the identity of an entity. A digital certificate is issued by an authority, referred to as a certification authority (CA). Because a digital certificate is issued by a certification authority, that authority guarantees the validity of the information in the certificate. Also, a certificate is valid for only limited period of time.

DC provide support for public key cryptography because digital certificates contain the public key of the entity identified in the certificate. Because the certificate matches a public key to a particular individual, and that certificate's authenticity is guaranteed by the issuer, the digital certificate provides a solution to the problem of how to find a user's public key and know it’s validity.

About Bitlocker:

Bit locker is full system encryption mechanism implemented at physical layer of the machine-like boot, drives and partitions.

BitLocker provides protection when used with a Trusted Platform Module (TPM) version 1.2. The TPM is a hardware component installed in many newer computers by the computer manufacturers. It works with BitLocker to help protect data and ensures that a computer has not been altered while the system was online/offline.

On computers that do not have a TPM version 1.2, we can still use BitLocker to encrypt the Windows operating system drive. However, this implementation will require the user to insert a USB startup key to start the computer or resume from hibernation, and will not provide the pre-startup system integrity verification offered by BitLocker with a TPM.

Advantage and disadvantage of Bit Locker:

Advantage:

  1. Provides full/partial disk encryption at physical level.
  2. Minimize the chance that useful data can be recovered from lost storage devices by a third party as the drives are locked at physical layer.
  3. We can configure group policy to limit computers running Windows so that they can only write data to BitLocker encrypted USB devices.
  4. Easily integrates with Active Directory for the purposes of data recovery.
  5. Pin is applicable at the booting of device, hence protects the integrity of the boot process.

Disadvantages:

  1. In rare cases, recovery keys are not properly archived. Without that key, our data might be lost in the event of a failure.
  2. We need to have a windows machine to support bitlocker.
  3. There’s no link between your Windows credentials and Bitlocker Credentials they are independent and over the time it might be harder to manage all different credentials for same set of entities.
  4. Bitlocker only supports USB STORAGE devices and PINs – no integration with any third party service for security purposes.

Alternatives to Bitlocker:

  1. Veracrypt: It is an on-the-fly encryption tool i.e. decrypts files only when they are needed and that the files are otherwise kept encrypted the rest of the time.
  2. GNU Privacy Guard: works on OS X, Linux, and Windows.
  3. Disk Utility: offers the best integration, ease of use and support with Mac OS.
  4. CipherShed: Completely open source and cross-platform support.


Related Solutions

THE CASE: Kaizer Consulting Kaizer Consulting is an international management consulting firm that specializes in business...
THE CASE: Kaizer Consulting Kaizer Consulting is an international management consulting firm that specializes in business strategy and serves as a key advisor to the world’s leading companies. It provides its clients with the unique insight to drive critical decision-making and solve their most pressing problems. Every year, the majority of Kaizer’s business comes from clients with whom they have worked in the previous year – an indicator of Kaizer’s ability to achieve lasting results for its clients. Kaizer’s client...
You are a Network and security engineer for the XYZ Consulting Corporation, which is a leading...
You are a Network and security engineer for the XYZ Consulting Corporation, which is a leading network designer and security provider for the small-scale offices. As the Network and security engineer you are required to perform the following tasks. Task 1: Propose a network design for small scale office (Ex: Business type, departments, building plan). You are free to assume the name of the office and number of staffs ➢ Purpose of the Project ➢ Network overview (ex: connecting PCs,...
Execusmart Consultants has provided business consulting services for several years. The company has been using the...
Execusmart Consultants has provided business consulting services for several years. The company has been using the percentage of credit sales method to estimate bad debts but switched at the end of the first quarter this year to the aging of accounts receivable method. The company entered into the following partial list of transactions. During January, the company provided services for $300,000 on credit. On January 31, the company estimated bad debts using 1 percent of credit sales. On February 4,...
A consulting firm hired you to improve the network security of a Hospital by adding extra...
A consulting firm hired you to improve the network security of a Hospital by adding extra services for defence against external attacks. 1. In order to protect classified encrypted data from disclosure and transmission outside of the Hospital network, you need to choose among the following: proper configuration of DMZ, use of strong encryption algorithms, safeguards over keys. State your selection and justify your choice. 2. You want to use a packet firewall to protect the Hospital network but you...
A consulting firm hired you to improve the network security of a Hospital by adding extra...
A consulting firm hired you to improve the network security of a Hospital by adding extra services for defence against external attacks. 1. In order to protect classified encrypted data from disclosure and transmission outside of the Hospital network, you need to choose among the following: proper configuration of DMZ, use of strong encryption algorithms, safeguards over keys. State your selection and justify your choice. 2. You want to use a packet firewall to protect the Hospital network but you...
You work for a consulting company as the senior network architect. Your company was contracted by...
You work for a consulting company as the senior network architect. Your company was contracted by a local university to design and deploy a new network. During the deployment process, this network will operate in parallel to the present infrastructure. The network currently has many performance issues and security concerns. A few months ago, there was a situation reported in the local newspapers that students had gained access to the student records database and had made modifications to grades. Your task as...
Addison Insurance Consulting (AIC) is a 30-year-old company that specializes in providing small businesses with supplemental insurance benefits that aren’t covered with normal insurance plans.
CASE 4.2: ADDISON INSURANCE CONSULTING (Ingram 112) Background Global Positioning Addison Insurance Consulting (AIC) is a 30-year-old company that specializes in providing small businesses with supplemental insurance benefits that aren’t covered with normal insurance plans. AIC focuses on small businesses with 20 or fewer employees such as machine shops, law firms, account firms, and small restaurants. AIC has three sales representatives serving the Cincinnati, Ohio metropolitan market. Joe Morgan, AIC’s founder and current president, was the company’s first salesperson. When...
Case StudiesWhen the average person thinks of network security within a school, they often think of...
Case StudiesWhen the average person thinks of network security within a school, they often think of the student trying to hack into the system to change their grade, to see if they can take over their friend’s computer, or to put a prank up on the school website. In light of the current network dangers these may be some of least of the school system worries.All of the following cases are based upon real situations. Read all of the case...
(Security-For-All Bhd (MFA) is a company specializing in installing and maintaining security systems for businesses and...
(Security-For-All Bhd (MFA) is a company specializing in installing and maintaining security systems for businesses and residential customers. It has been operating for 10 years. The company buys supplies ranging from CCTV cameras, smart locks, keypad locks, sensors, alarms, smoke detectors and other equipment from reputable vendors in town for customers’ installations /Purchase of supplies -The purchasing process starts with filling up of purchase requisition forms by the Inventory Department when the inventory level reaches the re-order point. They then...
Define the scope of network security.
Define the scope of network security.
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT