Top Banner
Janseva Samiti Sanchalit SHRI M.D. SHAH MAHILA COLLEGE OF ARTS & COMMERCE B.J.PATEL ROAD, MALAD (W), MUMBAI – 400 064. (Affiliated to S. N. D. T. Women’s University, Mumbai – 400 020.) NAAC REACCREDITED ‘A’ Grade
19
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: key management

Janseva Samiti SanchalitSHRI M.D. SHAH MAHILA

COLLEGE OF ARTS & COMMERCEB.J.PATEL ROAD, MALAD (W),

MUMBAI – 400 064.

(Affiliated to S. N. D. T. Women’s University, Mumbai – 400 020.)

NAAC REACCREDITED ‘A’ Grade

Page 2: key management

KEY MANAGEMENT

SYSTEM[KMS]

Page 3: key management

TEAM MEMBERS

Namrita Anchan

Asha sharma

Prajakta

Harsha kamble

Krupa jani

Richa seth

Sinthasha Pakkir

Page 4: key management

VARIOUS DEPARTMENTS

• BMS (Bachelor in Management Studies)• BCA (Bachelor in Computer Application)• LIBRARY• PRINCIPAL’S OFFICE• MAIN KEYBOARD• NON-TEACHING OFFICE• NCC• NSS• ASTITVA• DEGREE-COMMERCE,ARTS,MCVC• POST GRADUATION DEGREE

Page 5: key management

Definition

• Key management is the set of techniques and procedures supporting the establishment and maintenance of key relationships between the authorized parties

Page 6: key management

PROBLEMS IDENTIFIED

• No immediate identification.• Wastage of time & energy to find out the

proper keys.• Frequently missing keys.• Expenses required to be paid to the makers.• Cupboards becomes unused because of no

availability of keys.• Sometimes keys are left at home.

Page 7: key management

PROBLEM AREAS

The major problems identified were • No immediate identification of keys of cupboards.• Wastage of time & energy to find out the proper

keys.• Frequently missing keys.• Expenses required to be paid to the makers.• Cupboards becomes unused because of un

availability of keys.• Communication gap between staff members.

Page 8: key management

Why are we talking about key management?

• The objective of key management is to maintain keying relationships and keying material in a manner that counters relevant threats.

• In practice an additional objective is conformance to a relevant security policy

Page 9: key management

Why are we talking about key management?

1. compromise of confidentiality of secret keys

2. compromise of authenticity of secret or public keys.

3. unauthorized use of public or secret keys

Page 10: key management

BRAIN STORMING FOR SOLUTIONS

Page 11: key management

Effect

Effect AccuracyAccuracy

Easy to maintain keysEasy to maintain keys

Leave record available at Leave record available at glanceglance

Save time &Save time &StationaryStationary

Page 12: key management

Members made use of

ActionAction

Check

DoDo

PlanPlan

PDCA Cycle

Page 13: key management

No of meetings Held

16

SCHEDULE

Attendance 90%

No of meetings planned

20

Page 14: key management

SOLUTIONS

• Keys organized at one particular known place.• Different colors of keys used.• Interaction being maintained among the

employees.• Systematic arrangement of keys.• A chain cycle being organized among employees.• Effective training should be provided to the

employees.

Page 15: key management

TANGIBLE BENEFITS

• Quick and easy use of keys. • From anywhere anytime.• Saves unnecessary avoidable cost of making

duplicate keys.• Keys can be easily identified by unknown users.

Page 16: key management

FISH BONE DIAGRAM

Page 17: key management

What capability does the KMSprovide?

• The KMS has been designed to meet the followinggeneral requirements:

• Capture key profiles• Establish an organizational structure for managing keys

within your unit to include Key Control Coordinator(s) and• Associate Key Control Coordinator(s).• Inventory physical keys, including

Organizing keys by Key Groups and Key Rings Assigning access locations to keys Capture transactions associated with keys such as: Assigning keys to individuals Putting keys in storageIdentifying a key as lost/stolen or broken

Page 18: key management

CONTINUED….

• Inventory physical keys, including• Organizing keys by Key Groups and Key

Rings• Assigning access locations to keys• Capture transactions associated with keys

such as:Assigning keys to individualsPutting keys in storageIdentifying a key as lost/stolen or broken

Page 19: key management