Instructions

Based on the steps taken in the lab, explain why both public and private keys are needed in an asymmetric key pair. (Please submit the answer on the assessment template part 1.3 response; a short paragraph is sufficient)

Part 2 – Security Planning: Encryption Usage and Remote Access
Create the following security policies for the company described in the Course Security Scenario. State any assumptions that you make, or details that you might add that add depth, texture, or provide a foundation for your policies. Your goal is to create effective policies that represent modern systems assurance security practices and planning.

Encryption Usage in a regulated health care environment (please submit on the assessment template part 2: security planning item 2.1).

Remote Access (please submit on the assessment template part 2: security planning item 2.2).

Consider the following scoring guide criteria as you complete your assessment:

Provide required screenshots that document lab completion.
Write an encryption usage policy that is appropriate for the Course Security scenario.
Write a remote access policy that is appropriate for the Course Security scenario.
Explain why both public and private keys are needed in an asymmetric key pair.