Analyze the fundamentals of pki

Assignment Help Computer Network Security
Reference no: EM131396221

Case Study: Public Key Infrastructure

Suppose you are the Information Security Director at a small software company. The organization currently utilizes a Microsoft Server 2012 Active Directory domain administered by your information security team. Mostly software developers and a relatively small number of administrative personnel comprise the remainder of the organization. You have convinced business unit leaders that it would be in the best interest of the company to use a public key infrastructure (PKI) in order to provide a framework that fosters confidentiality, integrity, authentication, and nonrepudiation. Email clients, virtual private network (VPN) products, Web server components, and domain controllers would utilize digital certificates issued by the certificate authority (CA). Additionally, the company would use digital certificates to sign software developed by the company in order to demonstrate software authenticity to the customer.

Write a two to three page paper in which you:

1. Analyze the fundamentals of PKI, and determine the primary ways in which its features and functions could benefit your organization and its information security department.

2. Propose one way in which the PKI could assist in the process of signing the company's software, and explain the main reason why a customer could then believe that software to be authentic.

3. Compare and contrast public and in-house CAs. Include the positive and negative characteristics of each type of certificate authority, and provide a sound recommendation of and a justification for which you would consider implementing within your organization. Explain your rationale.

4. Use at least three quality resources in this assignment (no more than 2-3 years old) from material outside the textbook. Note: Wikipedia and similar Websites do not qualify as quality resources.

Your assignment must follow these formatting requirements:

• Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. Check with your professor for any additional instructions.

• Include a cover page containing the title of the assignment, the student's name, the professor's name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length.

The specific course learning outcomes associated with this assignment are:

• Explain how businesses apply cryptography in maintaining information security.
• Use technology and information resources to research issues in information systems security.
• Write clearly and concisely about network security topics using proper writing mechanics and technical style conventions.

Reference no: EM131396221

Questions Cloud

Can a california state court exercise personal jurisdiction : Can a California state court exercise personal jurisdiction over the New York defendants in this case? What factors will the court consider in deciding this question and Do the Blues have standing in this case? Why or why not?
Criticize the given definitions - truculent : Criticize the following definitions in light of the eight rules for lexical definitions:- "Truculent" is if you're cruel or fierce.
Opportunity cost of producing a car in saudi arabia : The opportunity cost of producing a car in Saudi Arabia is ______ million barrels of oil. The opportunity cost of producing a car in the United States is _______ million barrels of oil.
How computer programs make decisions : Is it ethical for insurance companies to access your health records and then make insurance decisions about you?
Analyze the fundamentals of pki : Analyze the fundamentals of PKI, and determine the primary ways in which its features and functions could benefit your organization and its information security department.
Write a summary of two page about nanocomposites : Write a summary of two page about Nanocomposites
Criticize the given definitions - a house is a structure : Criticize the following definitions in light of the eight rules for lexical definitions:- A house is a structure made of wood or stone intended for human habitation.
Purchasing agent for a municipality : The purchasing agent for a municipality has contracted with a local car dealer to purchase four cars. The dealer has 25 cars on his lot; 10 red, 7 blue, 6 white, and 2 purple.
When an organization is preparing to outsource : When an organization is preparing to outsource and staff may/could lose their positions, what do you think is their biggest need from the organization?

Reviews

Write a Review

Computer Network Security Questions & Answers

  Explain the relationship between morality and ethics

In readings and class discussions we have talked about the relationship and distinctions between morality and ethics. Morality deals with basic principles of right and wrong or good and bad. Ethics deals with behavior and actions.

  Research paper about data encryption techniques

Write a research paper about data encryption techniques. Your content should include the following: Business advantages and disadvantages of full disk encryption, compared to other types of encryption techniques.

  Make an incident-response policy that covers the

gem infosys a small software company has decided to better secure its computer systems after a malware attack shut down

  Explain possible network infrastructure vulnerabilities

Identify possible network infrastructure vulnerabilities. Address network vulnerabilities with the appropriate security measures. Ensure that consideration is given to virtualization and cloud technology.

  Applications of private and public key cryptography

Explain why GPG encryption and decryption are quite fast - Create a file of close to 1 MB size and encrypt and decrypt it and note the time taken. Comment on the reason why this much time has taken.

  Design a remote access control policy for richman

Design a remote access control policy for Richman using the appropriate access controls for systems, applications, and data access. Include the design and justification for using the selected access controls for systems, applications, and data acc..

  What is ciphertext generated by encryption of character

A particular cipher is implemented by combining the ASCII representation of plaintext characters with pseudorandom bytes. What is the ciphertext (in binary form) generated by the encryption of the character D?

  Network threats

confidentiality, integrity and availability, trojan horse, Compress the data, Caesar cipher, rail fence cipher, PGP operation, network perimeter, MSFT, RSA cryptosystem

  Which type of computer crime describes actions

Which type of computer crime describes actions in which the computer is used only to further a criminal end? In other words, the computer or data contained therein is not the object of the crime.

  How is the security of a firms information system affected

How is the security of a firm's information system and data affected by its people, organization, and technology

  Identify hardware and software needed to secure network

Identify hardware and software needed to secure your choice of networks against all electronic threats. Distinguish between local area networks (LANs), wide area networks (WANs), and wireless technologies

  For this application you will determine how your computer

for this application you will determine how your computer is connected through a network. you do not have to actually

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd