Preview

PKI and Encryption at Work

Good Essays
Open Document
Open Document
575 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
PKI and Encryption at Work
PKI and Encryption at Work

The Quality Medical Company is interested in expanding its ability to obtain more customers/clients through the Quality Medical Company’s internet presence. Quality Medical Company should consider the use PKI (Public Key Infrastructure) and Encryption to achieve a competitive and compliance advantage. Entities can have one or more private-public key pairs and associated public key certificates. A certificate is a statement issued by a certification authority according to a policy that binds an entity 's public key to its name for a period of time. (You 'll learn more about policies later in the chapter.) Another entity that trusts this CA also trusts that the public key belongs to the named entity. When entity A is presented with a certificate by entity B, entity A can tell from the certificate name that the certificate belongs to a legitimate user of the system. Entity B proves he or she is the legitimate holder of the certificate by proving his or her knowledge of the associated private key. Entity A can optionally check the certificate 's current validity by looking it up on the CA 's CRL.
Furthermore, entities A and B can now use end-to-end confidentiality and integrity services without the cooperation of any third entity. For example, users can exchange secure e-mail and securely access Web content on an intranet. Another advantage is that private keys are typically 1024-bit-long strings and cannot be guessed the way that passwords can. Therefore, you can use certificates for strong authentication.
The Quality medical Company will have to comply with several laws and regulations, such as the Sarbanes-Oxley Act (SOX), the Gramm-Leach-Bliley Act (GLBA), the Health Insurance portability act (HIPAA) and Personally Identifiable Information (PII), to comply with public company regulations and compliance laws the Quality Medical Company should consider the use of encrypting data and the following steps and these are the same steps



References: Ballad, B. Ballad, T. and Banks, Erin. Access Control, Authentication, and Public Key Infrastructure. 2011. Jones and Bartlett Learning

You May Also Find These Documents Helpful

  • Satisfactory Essays

    is3230 week1 assgnmnt1

    • 362 Words
    • 3 Pages

    References: Ballad, Bill, Tricia Ballad, and Erin K. Banks. 2011. Access Control, Authentication, and Public Key Infrastructure. Sudbury: Jones & Bartlett Learning.…

    • 362 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    Cmgt/554 Week 2

    • 1453 Words
    • 6 Pages

    A major goal of the hospital is to protect the personal information of the patients who fall under the guidelines of the Health Insurance Portability and Accountability Act (HIPAA). HIPAA requires the protection and confidential handling of protected health information ("Health Insurance Portability And Accountability Act", 2012). To make sure that standards are meet, Patton-Fuller uses an encrypted storage system known as Advanced Encryption Standard (AES) (Apollo Group, 2011). According to "Encryption…

    • 1453 Words
    • 6 Pages
    Good Essays
  • Satisfactory Essays

    Foremost in compiling a health care risk assessment will be to ensure all methodologies take into account compliance of the U.S. Health Insurance Portability and Accountability Act (HIPAA) of 1996. The healthcare provider must comply with the HIPAA Privacy and Security Rules in order to avoid penalties.…

    • 311 Words
    • 1 Page
    Satisfactory Essays
  • Better Essays

    (2015), lauded the benefits of EHR to increase, substantially the quality of health care and its effectiveness in reducing cost. However, they listed these as ethical possibilities: privacy and confidentially, security and data inaccuracies. In order to ensure compliance, there will be appropriate administrative, technical, and physical safeguards in place. This will prevent the disclosure of protected health information, For example, shredding documents containing protected health information before discarding them, securing medical records with lock and key, using or pass code, and limiting access to only those who function requires the…

    • 1361 Words
    • 6 Pages
    Better Essays
  • Good Essays

    Put a set of standards that would protect the patients’ information that would be suitable in the health care services. Those privacy practices would have the follow the HIPPA Privacy Rule.…

    • 434 Words
    • 2 Pages
    Good Essays
  • Good Essays

    In 1996, Health Insurance Portability and Accountability Act (HIPAA) was signed into legislation. HIPAA provides patients with access to their medical records and gives patients more control over the handling and distribution of their personal health information (PHI). HIPAA regulations are extremely important in ensuring the privacy of PHI and helps reduce any fraudulent activity. By fully following HIPAA regulations, healthcare compliant facilities are more likely to save money by avoiding lawsuits and fines. Facilities covered by HIPAA are required to implement safeguards (both physical and technical) to protect the confidentiality and integrity of the patient’s health information.…

    • 260 Words
    • 2 Pages
    Good Essays
  • Good Essays

    PKI Paper

    • 801 Words
    • 3 Pages

    In a single service package, a commercial PKI provides reliability, support, and indemnification over in-house PKI solution. Commercial PKI offerings are relatively well-tested…

    • 801 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    "Clearinghouses," and healthcare providers must conform: Administrative simplification, which calls for use of the same computer language industry-wide; Privacy protection, which requires healthcare providers to take reasonable measures to protect patients' written, oral, and electronic information. Congress passed HIPAA in an effort "to protect the privacy and security of individually identifiable health information.” Additionally, lawmakers "sought to reduce the administrative costs and burden associated with healthcare by standardizing data and facilitating transmission of many administrative and financial transactions." HIPAA consultants say the new regulations should save the healthcare industry money in the long run, provide improved security of patient information, and allow patients to have better access to their own healthcare information. The HIPAA law is a multi-step approach that is geared to improve the health insurance system. One approach of the HIPAA regulations is to protect privacy. It is also known as the law to treat the sick, or injured regardless of the fact whether they are able to pay. The provisions that are included in the HIPAA law are provisions for…

    • 1281 Words
    • 6 Pages
    Powerful Essays
  • Good Essays

    Another form of health information exchange that was brought to light with HIPPA legislation was the privacy and security standards. The implementation was enacted in April of 2003; this would further allow patient information and health information to be more secure. In addition to HIPPA enacting their privacy and security laws many healthcare providers have taken measure into their own hands and added privacy and security laws within their practices. Also due to the expansion of technology many healthcare…

    • 566 Words
    • 3 Pages
    Good Essays
  • Good Essays

    ABC institute will want to email back and forth with XYZ Inc. They can manage this with using asymmetric keys. The sender will simply type the desired message and then use the public key of the person they wish to send the message for encrypting and therefore securing the message to be sent over the very public internet. Having done this the only person who could possibly open and read this email would be the desired recipient. This is insured because since their public key was used to encrypt, the only way to decrypt the message into a readable email is by using the recipient’s private key which only they have access to.…

    • 509 Words
    • 2 Pages
    Good Essays
  • Better Essays

    Define the following terms. Your definitions must be in your own words; do not copy them from the textbook.…

    • 1436 Words
    • 6 Pages
    Better Essays
  • Better Essays

    We Can But Dare We

    • 2030 Words
    • 6 Pages

    Due to the sensitive nature of the information kept by healthcare providers about their patients, principles were put in place to reduce the risk of breeching patient privacy. The Health Insurance Portability and Accountability Act of 1996 (HIPAA) set national standards and regulations regarding the protection of patients’ privacy and personal health information (U.S. Department of Health and Human Services [HHS], n.d.). Under The Privacy Rule enacted by HIPAA, protection is governed over all,…

    • 2030 Words
    • 6 Pages
    Better Essays
  • Good Essays

    The Rsa Algorithm

    • 5348 Words
    • 22 Pages

    In 1978, Ron Rivest, Adi Shamir, and Leonard Adleman introduced a cryptographic algorithm, which was essentially to replace the less secure National Bureau of Standards (NBS) algorithm. Most importantly, RSA implements a public-key cryptosystem, as well as digital signatures. RSA is motivated by the published works of Diffie and Hellman from several years before, who described the idea of such an algorithm, but never truly developed it. Introduced at the time when the era of electronic email was expected to soon arise, RSA implemented two important ideas: 1. Public-key encryption. This idea omits the need for a “courier” to deliver keys to recipients over another secure channel before transmitting the originally-intended message. In RSA, encryption keys are public, while the decryption keys are not, so only the person with the correct decryption key can decipher an encrypted message. Everyone has their own encryption and decryption keys. The keys must be made in such a way that the decryption key may not be easily deduced from the public encryption key. 2. Digital signatures. The receiver may need to verify that a transmitted message actually originated from the sender (signature), and didn’t just come from there (authentication). This is done using the sender’s decryption key, and the signature can later be verified by anyone, using the corresponding public encryption key. Signatures therefore cannot be forged. Also, no signer can later deny having signed the message. This is not only useful for electronic mail, but for other electronic transactions and transmissions, such as fund transfers. The security of the RSA algorithm has so far been validated, since no known attempts to break it have yet been successful, mostly due to the difficulty of factoring large numbers n = pq, where p and q are large prime numbers.…

    • 5348 Words
    • 22 Pages
    Good Essays
  • Better Essays

    Electronic commerce uses technology such as digital signatures and public key encryption to establish authenticity and non-repudiation.…

    • 1955 Words
    • 8 Pages
    Better Essays
  • Satisfactory Essays

    Public Key Encryption

    • 330 Words
    • 2 Pages

    When you make a request to visit a website, that request must pass through many different networks. Any of these networks could be used to potentially eavesdrop or tamper with your connection. If a malicious user got into any one of those systems, then they have the potential to see what’s traveling through the wire. Normally, web requests are sent over regular HTTP, where a client’s request and the server’s response are both sent as plain text.…

    • 330 Words
    • 2 Pages
    Satisfactory Essays