PKI and Encryption at Work Student’s Name Institution PKI and Encryption at Work In the current century practitioners and all health stakeholders should embrace the change in technology. There is a need for applying hi-tech tools to ensure efficiency quality and safety. Public Key Infrastructure (PKI) will be very fundamental in securing the sensitive data for Quality Medical Service (QMC) and help to manage all its content needs. The most paramount thing about PKI is transparency. When implementing a PKI solution the company take into account some of the most important items including certificate repository public key certificate certificate revocation key backup and recovery management key history and support cross-certification (Nelson & West 2017). Considerations First before even devising a strategy it is important to consider the types and number of certification authorities that have to be deployed. The design should not overlook physical control. Emphasis will be placed multitude of legislative and regulatory laws. The company needs to adopt a Transport Layer Security (TLS) as a potential PKI solution to guarantee the safety of online transfer of information. The TLS will help to encrypt and help protect data at rest (DAT) and data in motion (DIM). In this case the company will be certain that a third party cannot eavesdrop on confidential information client data being transferred online. In the process QMC can comply with the relevant regulations. References Dierks T. (2008). The transport layer security (TLS) protocol version 1.2. Nelson M. & West K. (2017). Smart PKI for Healthcare Provider Organizations Medical Device Security. Himss Annual Conference Exhibition (pp. 1-42). Orlando. Retrieved from www.himssconference.org Polk T. McKerry K. & Chokhani S. (2014 April). Guidelines for the Selection Configuration and Use of Transport Layer Security (TLS) Implementations. Retrieved from National Institute of Standards and Technology Website: http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-52r1.pdf [...]
Only respond if you are familiar with information technology security. Able to present a solution in the form of a professional report to a senior management. Also it is very important that I will get this assignment back anytime on Friday February 9th.!!. Please do not respond if you are unable to with this case study plagiarism free. Also do not check paper for plagiarism because I have my own system to check. Please read the direction below for your instructions.