Compare and contrast public and in-house cas

Assignment Help Computer Network Security
Reference no: EM131391008

Case Study: Public Key Infrastructure

Suppose you are the Information Security Director at a small software company. The organization currently utilizes a Microsoft Server 2012 Active Directory domain administered by your information security team. Mostly software developers and a relatively small number of administrative personnel comprise the remainder of the organization. You have convinced business unit leaders that it would be in the best interest of the company to use a public key infrastructure (PKI) in order to provide a framework that fosters confidentiality, integrity, authentication, and nonrepudiation. Email clients, virtual private network (VPN) products, Web server components, and domain controllers would utilize digital certificates issued by the certificate authority (CA). Additionally, the company would use digital certificates to sign software developed by the company in order to demonstrate software authenticity to the customer.

Write a two to three page paper in which you:

1. Analyze the fundamentals of PKI, and determine the primary ways in which its features and functions could benefit your organization and its information security department.

2. Propose one way in which the PKI could assist in the process of signing the company's software, and explain the main reason why a customer could then believe that software to be authentic.

3. Compare and contrast public and in-house CAs. Include the positive and negative characteristics of each type of certificate authority, and provide a sound recommendation of and a justification for which you would consider implementing within your organization. Explain your rationale.

4. Use at least three quality resources in this assignment (no more than 2-3 years old) from material outside the textbook. Note: Wikipedia and similar Websites do not qualify as quality resources.

Your assignment must follow these formatting requirements:

• Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. Check with your professor for any additional instructions.

• Include a cover page containing the title of the assignment, the student's name, the professor's name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length.

Reference no: EM131391008

Questions Cloud

Current event or recent research related to essay topic : Choose a science news article highlighting a current event or recent research related to the essay topic: Human Nutrition and Diet In searching for an appropriate article, the following online science news sources are suggested:
Forty percent of american kids living : Forty percent of American kids living below the poverty line are obese or overweight, according to a 2010 study published in Health Affairs. Poorer kids are more likely to be obese or overweight than middle class kids and consume a bigger proportio..
Benefits in reducing the risk of colorectal cancer : Why might soluble fiber not have the same benefits in reducing the risk of colorectal cancer? How might fiber from whole grain bread or high fiber cereals reduce the risk of colorectal cancer?
A brief history of design of earth retaining structures : For the first design project, you need to conduct a quick research on the following topics:A brief history of design of earth-retaining structures.Types of earth-retaining structures
Compare and contrast public and in-house cas : Analyze the fundamentals of PKI, and determine the primary ways in which its features and functions could benefit your organization and its information security department. Compare and contrast public and in-house CAs.
Relationship between chromosomes and dna : Summarize the Chromosomal Theory of Inheritance and how chromosomal abnormalities can lead to genetic disorders. Describe the relationship between chromosomes and DNA.
How the companys treatment of both the covert and overt : Explain how the company's treatment of both the "covert" and "overt" salts applications for jobs compares to the recommended counter-salting steps for employers.Would either the "covert" or the "overt" salts in this case satisfy the NLRB ruling th..
Does this meet the ssa requirement for an existing system : These other components were mostly off the shelf, but they had never been integrated into a system before. Does this meet the SSA requirement for an existing system?
Major types of infectious agents : Create a list of the major types of infectious agents. For each type, create a list of the infection cycle, including: the infectious agent, reservoir, susceptible host, means of transmission, portals of entry, and portals of exit.

Reviews

Write a Review

Computer Network Security Questions & Answers

  Why will you choose a certain acquisition method

What tools listed in the text book are available and how do you plan to acquire the data? Why will you choose a certain acquisition method?

  Describe the security features available on a platform

Describe the security features available on a platform of your choice (for example, Linux/Android/Mac OS X/Windows/Apache/Java/Perl), to mitigate a specific type of attack (for example, adware/malware/SQL injection/spoofing/tampering).

  Discuss technology challenges of trying to integrate systems

Discuss the technology challenges of trying to integrate systems and still provide effective security.

  Evaluate from a management perspective the different kinds

assess from a management perspective the different types of security models and their implications to protect the

  What role does security policy play in securing

What are some of the tools that are available to security professionals interested in evaluating the contents of packets trying to gain entry into their trusted networks? What role does security policy play in securing the external borders or edge ..

  How many bits is the encrypted message

Based on the understanding of Q4 of Bart B, use the generated keys of Q2 - Part C to encrypt the message of Q1 - Part C using the Simplified DES algorithm.

  Identify the current software security threats

The CISO often thinks that The Open Web Application Security Project (OWASP) is a good source to identify the current software security threats.

  How do concepts like secure socket layer

How do concepts like secure socket layer

  Server program receives a newline character

The server program receives a NewLine character sent from the client, it will display a message like 'Line from the client: - How much will it be to get some help with this small portion of the assignment?

  Describe real-world examples that help support your position

Prepare your paper in Word format and submit it through your Assignments Folder. The citations and the reference list in the paper should be formatted in accordance with APA 6th edition guidelines.

  Right information during an interview session

One of the toughest problems in investigating system requirements is to make sure they are complete and comprehensive. How would you ensure that you get all the right information during an interview session?

  Variation of rsa encryption and decryption

Why would a variation of RSA encryption/decryption where a single prime number is used the modolus insecure? How can someone recover a message x from the encrypted value.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd