Verisign Certification Statement

Improved Essays
A thorough analysis was made on the VeriSign Certification Practice Statement (CPS) document to identify the type of security services addressed and if the document enforces and support the FISMA security controls. The CPS presentation of the capabilities demonstrated on the security services were equated to the security controls and how the security services can reduce risk impact. The CPS details the authentication and identification, access controls and the audit VeriSign’s certificate policies mainly on the endurance of digital certificates and key management enforcing the CIA. The details of the findings that meets the standard of FISMA according to the NIST are:
Identification and Authentication for Rekey Requests: this security service addresses the IA-4 Identifier Management security control whereby it ensures user identifier to the intended party by distinctively verifying and identifying each user. The organization is enabled to manage these functionalities and in addition disabling users and enable decline to
…show more content…
Furthermore, CPS explains the contingency plan in securing information against third party and how information is released based on legislative law. It also points out the Verisign Trust Network that caters the integrity of the CPS and reassures trustworthiness among its users and how trusted personnel have access to sensitive information in avoidances of mistrusted associates. The availability of the system 24/7 somewhat covers the availability part of CIA in the sense the system is readily accessible to the appropriate users. This analysis serves that the CPS does address the FISMA security control and covers the CIA in order to lessen the security service risk

Related Documents

  • Improved Essays

    Ba501 Week 1 Assignment

    • 740 Words
    • 3 Pages

    II Abstract Security is a need that is increasing at a rapid rate especially with a large organization and constant changes seem to be the norm.…

    • 740 Words
    • 3 Pages
    Improved Essays
  • Decent Essays

    Nt2580 Unit 7

    • 395 Words
    • 2 Pages

    There is panel control where a unit/equip is available in front of their cameras and other apparels to diagnose and give disposable information about the concern. Most often, this kind of security is to ensure that sensitive areas can only be accessed by authorized persons only, they control the equipment, data, electronic information of the organization from breaching or any other violence. D.B Parker proposed three additional elements for Information Security: Firstly, we have authenticity which accounts on the veracity of the information stored by the control or the website manager. It ensure that the members registered in the organization are who they state to be. We have possession and control, this is the control of the documents and all information saved in a computer or on a chip with encrypted code or information.…

    • 395 Words
    • 2 Pages
    Decent Essays
  • Improved Essays

    MIS101: Assignment

    • 559 Words
    • 3 Pages

    MIS101 – Assignment Template – Trimester 1, 2015 Your Name: Costa Banias Student Number: 215162709 Deakin Email: cbanias@deakin.edu.au Assignment – Part A Question 1: Provide a brief explanation of each of the following security terms and provide an example of each. (~250 Words) o Something the user is, also known as biometrics is a type of authentication system that examines person’s natural physical characteristics. There are various applications that can be undertaken such as retina scans, fingerprint scans, facial recognition and iris scans.…

    • 559 Words
    • 3 Pages
    Improved Essays
  • Great Essays

    Running Head: 1 INTELLIGENCE AGENCIES 1 Intelligent Agencies STS 364 Sadat Cano Arizona State University 3/23/2015 In the U.S national security Umbrella corporations it is composed of many agencies that related to the national security of the United States of America. The U.S national security organizations are composed of many different organizations safe guarding the United of States of American. This organizations serve a purpose to ensure the safety of the United States Citizens and they contribute to the national security of the country. The intelligence is often regard as “intelligence of the enemy”(Troy 1991-92,433), studying the enemy and intelligence organizations collect and analyze data.…

    • 1597 Words
    • 7 Pages
    Great Essays
  • Great Essays

    Joint Force 2020

    • 1383 Words
    • 6 Pages

    The Chairman of Joint Chiefs of Staff, General Martin Dempsey, summed up his assessment of the 2014 Quadrennial Defense Review (QDR) in the following statement: “With our “ends” fixed and our “means” declining, it is therefore imperative that we innovate within the “ways” we defend the Nation.” Strategic planning and transition to Joint Force 2020 (JF 2020) in a fiscally constrained environment affords DoD senior leaders the opportunity to be more innovative than ever before in assessing and mitigating risks to effectively confront a multitude of increasingly multifaceted security challenges. In the long run, a leaner, agile, adaptable, interoperable, and technologically sophisticated JF 2020 is necessary for the Combatant Commanders to…

    • 1383 Words
    • 6 Pages
    Great Essays
  • Superior Essays

    The agency not only recognizes the importance of the tasks ahead but takes time to step back and reflect and examine their rich cryptologic heritage. During the VENONA Project and the Cuban Missile Crisis, the NSA/CSS used their knowledge to protect and serve the nation. In the VENONA Project, they used cryptanalysis which identified numerous Soviet agents in the United States. The mission of the small program, at the time, was to examine and exploit Soviet diplomatic communications. Although it took almost two years for cryptologists to crack the code, the information gained provided U.S. leadership insight into the Soviet Union’s intentions and treasonous activities.…

    • 1143 Words
    • 5 Pages
    Superior Essays
  • Great Essays

    The main goal of the CATIC was designed to combat terrorism with this statewide intelligence system. It linked federal, state, and local information services in one system and divided operational zones into five administration areas (White 347). In 2002, the Department of Justice designed this program to train intelligence analysts to operate within civil rights guidelines and to use information in a secure communication systems. The pros of this system combined state and local law enforcement to access types of information coming from various police agencies. The information would correlate and be organized by analysts that are looking for terrorism trends.…

    • 2031 Words
    • 9 Pages
    Great Essays
  • Improved Essays

    Public Key Infrastructure is a comprehensive subject that is constantly developing to meet high growing demands of the business word. PKI is one of the most effective way for securing networks. The encrypted information that is sent is delivered using a public key. An individual is able to provide the public key to the sender, or the key can be retrieved from the directory from where it was published. PKI works in concert of other security mechanisms to help protect vital information (Weise, 2001).…

    • 680 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Everybody walks around like a robot, every move and every word is being surveillanced. A totalitarian government is a political concept that citizens should be completely subject to an absolute state of authority. In 1984 many examples of the control and authority, the totalitarian government of Oceania has over it’s citizens are made very clear, and are quite alarming to the average reader. Residing in a “free” country without freedom, this is totalitarianism, this is 1984.…

    • 1550 Words
    • 6 Pages
    Improved Essays
  • Improved Essays

    Post 9/11 Privacy

    • 1178 Words
    • 5 Pages

    After the attacks of 9/11, nearly 263 government agencies were reorganized as well as the creation of the Department of Homeland security, which nearly doubled the intelligence budget from 2001 (Freedman, 2011). Much of the technology used in surveillance efforts is off-the-shelf and is lacking in innovation. Moreover, the technological boom in the private sector has afforded the Government many avenues in which to collect information on private citizen including social media, cell phone records, GPS information, financial records, medical information and other third-party services that are capable of storing gigabytes of information on an individual (Shamsi & Abado, 2011). This notion leads to the issues of that information’s security…

    • 1178 Words
    • 5 Pages
    Improved Essays
  • Great Essays

    To ensure our safety under the national security, we had to have partnership trust within our state, federal and local agencies. This made sharing information effective, that’s why we focus on the post 9-11 threat environment. To support preparedness efforts, there’re many of governmental, commercial, and non-governmental organizations that provide officials with homeland security alerts and updates along with state level government have fusion centers that integrate and analyze homeland security information. “The 9/11 terrorist attacks focused public attention on the need for better information sharing among intelligence, law enforcement, and emergency management agencies” (example 2016). The 9/11 Commission was a direct result in the agencies providing incentives for sharing, to restore a better balance between shared task, knowledge and security.…

    • 1534 Words
    • 7 Pages
    Great Essays
  • Improved Essays

    The Army Counterintelligence field first began in 1942 as the Army Counter Intelligence Corps. Army CI has undergone many changes in the last 74 years since then. Some of the time, changes were made with the intention of furthering the successes of Army CI. Other times, changes were made to prevent shortfalls that were identified through previous failures. All in all, there are many things right with the Army CI and there are many things wrong.…

    • 1129 Words
    • 5 Pages
    Improved Essays
  • Great Essays

    Intelligence in Homeland Security Introduction After the attack of 9/11 on the United States the Nation learned there were many areas that needed improvement in regards to the security of the homeland. The Department of Homeland Security (DHS) had to take into account the lessons learned from 9/11, especially the shortfalls that were seen in intelligence gathering and make some major changes. The DHS is not the only agency that is responsible for gathering information for the Nation’s safety, there are many different national agencies that provide intelligence for homeland security. Some of the National agencies include offices that many have heard of like Customs and Border Patrol, the U.S. Coast Guard or the Secret Service, but there are other National agencies that contribute that most Americans may not know about.…

    • 1699 Words
    • 7 Pages
    Great Essays
  • Improved Essays

    There are quite a few government and intelligence agencies including the National Security Agency (NSA), the Federal Bureau of Investigation (FBI), the Department of Homeland Security (DHS), and also state and local law enforcement agencies. With modern day technology becoming so advanced, agencies must find new ways to stay ahead and on top of the security for the nation. The National Security Agency’s mass surveillance has expanded in the years since September 11, 2001. Many people happen to be against government monitoring only because they are unaware of how data is retrieved, analyzed, and stored by the government networks. The process is more than just collecting information from phone calls, emails, and other online communications.…

    • 729 Words
    • 3 Pages
    Improved Essays
  • Great Essays

    Cyber Domain Case Study

    • 1692 Words
    • 7 Pages

    Introduction The cyber domain is perhaps the most complex domain to define in modern warfare. Academic literature has secured cyber as both a domain and part of the global common. National laws, policies, and understanding of the cyber domain are just being to mature; thus, the strategy to guide and form the required organizations to support cyber is just being to develop. This paper will consider whether the current national cyber construct is sufficient to address the cyber domains unique geography.…

    • 1692 Words
    • 7 Pages
    Great Essays