key management
TRANSCRIPT
![Page 1: key management](https://reader035.vdocuments.us/reader035/viewer/2022062706/557a0037d8b42a1c0a8b470f/html5/thumbnails/1.jpg)
Janseva Samiti SanchalitSHRI M.D. SHAH MAHILA
COLLEGE OF ARTS & COMMERCEB.J.PATEL ROAD, MALAD (W),
MUMBAI – 400 064.
(Affiliated to S. N. D. T. Women’s University, Mumbai – 400 020.)
NAAC REACCREDITED ‘A’ Grade
![Page 2: key management](https://reader035.vdocuments.us/reader035/viewer/2022062706/557a0037d8b42a1c0a8b470f/html5/thumbnails/2.jpg)
KEY MANAGEMENT
SYSTEM[KMS]
![Page 3: key management](https://reader035.vdocuments.us/reader035/viewer/2022062706/557a0037d8b42a1c0a8b470f/html5/thumbnails/3.jpg)
TEAM MEMBERS
Namrita Anchan
Asha sharma
Prajakta
Harsha kamble
Krupa jani
Richa seth
Sinthasha Pakkir
![Page 4: key management](https://reader035.vdocuments.us/reader035/viewer/2022062706/557a0037d8b42a1c0a8b470f/html5/thumbnails/4.jpg)
VARIOUS DEPARTMENTS
• BMS (Bachelor in Management Studies)• BCA (Bachelor in Computer Application)• LIBRARY• PRINCIPAL’S OFFICE• MAIN KEYBOARD• NON-TEACHING OFFICE• NCC• NSS• ASTITVA• DEGREE-COMMERCE,ARTS,MCVC• POST GRADUATION DEGREE
![Page 5: key management](https://reader035.vdocuments.us/reader035/viewer/2022062706/557a0037d8b42a1c0a8b470f/html5/thumbnails/5.jpg)
Definition
• Key management is the set of techniques and procedures supporting the establishment and maintenance of key relationships between the authorized parties
![Page 6: key management](https://reader035.vdocuments.us/reader035/viewer/2022062706/557a0037d8b42a1c0a8b470f/html5/thumbnails/6.jpg)
PROBLEMS IDENTIFIED
• No immediate identification.• Wastage of time & energy to find out the
proper keys.• Frequently missing keys.• Expenses required to be paid to the makers.• Cupboards becomes unused because of no
availability of keys.• Sometimes keys are left at home.
![Page 7: key management](https://reader035.vdocuments.us/reader035/viewer/2022062706/557a0037d8b42a1c0a8b470f/html5/thumbnails/7.jpg)
PROBLEM AREAS
The major problems identified were • No immediate identification of keys of cupboards.• Wastage of time & energy to find out the proper
keys.• Frequently missing keys.• Expenses required to be paid to the makers.• Cupboards becomes unused because of un
availability of keys.• Communication gap between staff members.
![Page 8: key management](https://reader035.vdocuments.us/reader035/viewer/2022062706/557a0037d8b42a1c0a8b470f/html5/thumbnails/8.jpg)
Why are we talking about key management?
• The objective of key management is to maintain keying relationships and keying material in a manner that counters relevant threats.
• In practice an additional objective is conformance to a relevant security policy
![Page 9: key management](https://reader035.vdocuments.us/reader035/viewer/2022062706/557a0037d8b42a1c0a8b470f/html5/thumbnails/9.jpg)
Why are we talking about key management?
1. compromise of confidentiality of secret keys
2. compromise of authenticity of secret or public keys.
3. unauthorized use of public or secret keys
![Page 10: key management](https://reader035.vdocuments.us/reader035/viewer/2022062706/557a0037d8b42a1c0a8b470f/html5/thumbnails/10.jpg)
BRAIN STORMING FOR SOLUTIONS
![Page 11: key management](https://reader035.vdocuments.us/reader035/viewer/2022062706/557a0037d8b42a1c0a8b470f/html5/thumbnails/11.jpg)
Effect
Effect AccuracyAccuracy
Easy to maintain keysEasy to maintain keys
Leave record available at Leave record available at glanceglance
Save time &Save time &StationaryStationary
![Page 12: key management](https://reader035.vdocuments.us/reader035/viewer/2022062706/557a0037d8b42a1c0a8b470f/html5/thumbnails/12.jpg)
Members made use of
ActionAction
Check
DoDo
PlanPlan
PDCA Cycle
![Page 13: key management](https://reader035.vdocuments.us/reader035/viewer/2022062706/557a0037d8b42a1c0a8b470f/html5/thumbnails/13.jpg)
No of meetings Held
16
SCHEDULE
Attendance 90%
No of meetings planned
20
![Page 14: key management](https://reader035.vdocuments.us/reader035/viewer/2022062706/557a0037d8b42a1c0a8b470f/html5/thumbnails/14.jpg)
SOLUTIONS
• Keys organized at one particular known place.• Different colors of keys used.• Interaction being maintained among the
employees.• Systematic arrangement of keys.• A chain cycle being organized among employees.• Effective training should be provided to the
employees.
![Page 15: key management](https://reader035.vdocuments.us/reader035/viewer/2022062706/557a0037d8b42a1c0a8b470f/html5/thumbnails/15.jpg)
TANGIBLE BENEFITS
• Quick and easy use of keys. • From anywhere anytime.• Saves unnecessary avoidable cost of making
duplicate keys.• Keys can be easily identified by unknown users.
![Page 16: key management](https://reader035.vdocuments.us/reader035/viewer/2022062706/557a0037d8b42a1c0a8b470f/html5/thumbnails/16.jpg)
FISH BONE DIAGRAM
![Page 17: key management](https://reader035.vdocuments.us/reader035/viewer/2022062706/557a0037d8b42a1c0a8b470f/html5/thumbnails/17.jpg)
What capability does the KMSprovide?
• The KMS has been designed to meet the followinggeneral requirements:
• Capture key profiles• Establish an organizational structure for managing keys
within your unit to include Key Control Coordinator(s) and• Associate Key Control Coordinator(s).• Inventory physical keys, including
Organizing keys by Key Groups and Key Rings Assigning access locations to keys Capture transactions associated with keys such as: Assigning keys to individuals Putting keys in storageIdentifying a key as lost/stolen or broken
![Page 18: key management](https://reader035.vdocuments.us/reader035/viewer/2022062706/557a0037d8b42a1c0a8b470f/html5/thumbnails/18.jpg)
CONTINUED….
• Inventory physical keys, including• Organizing keys by Key Groups and Key
Rings• Assigning access locations to keys• Capture transactions associated with keys
such as:Assigning keys to individualsPutting keys in storageIdentifying a key as lost/stolen or broken
![Page 19: key management](https://reader035.vdocuments.us/reader035/viewer/2022062706/557a0037d8b42a1c0a8b470f/html5/thumbnails/19.jpg)