Problem on public key infrastructure

Assignment Help Basic Computer Science
Reference no: EM13928682

Public Key Infrastructure

You are the Information Security Officer at a small software company. The organization currently utilizes a Microsoft Server 2008 Active Directory domain administered by a limited number of over-tasked network administrators. The remainder of the organization comprises mostly software developers and a relatively small number of administrative personnel. The organization has decided that it would be in its best interest to use a public key infrastructure (PKI) to provide a framework that fosters confidentiality, integrity, authentication, and nonrepudiation. Email clients, virtual private network products, Web server components, and domain controllers would utilize digital certificates issued by the certificate authority (CA). Additionally, digital certificates would be used to sign software developed by the company to demonstrate software authenticity to the customer.

Write a two to three (2-3) page paper in which you:

1. Identify and analyze the fundamentals of PKI.

2. Analyze positive and negative characteristics of a Public and In-house CA.

3. Provide a sound recommendation for either a Public CA or an In-house CA.

Reference no: EM13928682

Questions Cloud

Discuss job-relevant strengths and weaknesses : What would you call a meeting that is typically done once a year to identify and discuss job-relevant strengths and weaknesses of individuals or work teams?
What is their solution for stabilizing economic fluctuations : Why do they believe changes in government spending affect the economy differently than changes in income taxes?
Assignment on mobile devices : You are an Information Security consultant for a small doctor's office consisting of three doctors and two nurses. The office is physically located among several other professional office spaces.
Example of the power of government derived : Policies that affect the supply, demand, and value of a nation's currency are: The primary way of accomplishing public policy is through:
Problem on public key infrastructure : You are the Information Security Officer at a small software company. The organization currently utilizes a Microsoft Server 2008 Active Directory domain administered by a limited number of over-tasked network administrators.
Is arbitrage good or bad for markets and investors : Is arbitrage good or bad for markets and investors? why
Which is more appropriate today : What is the difference between contractionary and expansionary fiscal policies?
Creating the critical path : Create a graphic rendering of the critical path for your project using Visio or its open source alternative software. Note: The graphically depicted solution is not included in the required page length.
Explain the stages of change : Explain the stages of change which are outlined by Prochaska and Diclemente and give an example of what a client might say in that stage

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Explain how cloud-based data storage works

Explain how cloud-based data storage works. What factors you consider when selecting a vendor for a cloud-based storage solution for your company

  Critical issues related to it governance

Read the scenario below and identify the critical issues related to IT Governance and determine how you would resolve the issues. Write a 3 page paper that addresses the following issues

  Explain company-s business intelligence products and service

Go to IBM.COM discover all company's business intelligence (BI) products and services Explain their process in minimum of half page to full page.

  Write the definition of a class player containing

Write the definition of a class Player containing: An instance variable name of type String , initialized to the empty String. An instance variable score of type int , initialized to zero.

  Security of the facilities

Write 2 pages of the physical security policy section for Home Depot regarding their security incident. Include the follow:Security of the facilities:  -Physical entry controls

  Which detects even parity

Consider the subsequent circuit, which detects even parity. There are one output, even, and three inputs, a(2), a(l) and a(0), which are grouped as a vector or bus.

  Convert a gui server to server core

convert a GUI server to Server Core

  How long will it take for input size

How long will it take for input size 500 if the running time is the following

  Create a class that simulates an alarm clock

In addition, have both constructors set the alarm clock as off. (you will need a Boolean variable that determines whether the alarm is on or off) . The function or method you use to set the alarm will set the alarm on.

  Create a digital clock with time zone application

Create a Digital Clock with time zone application. For this WPF application create a window, which consists of a ComboBox control (to allow time zone selection) at the top, and a Grid area underneath, which contains a Digital Clock (to display tim..

  Find an article in the news regarding wireless hacking

Research via the internet and find an article in the news regarding wireless hacking, hardware hacking, or other security breach.As security and IT change so rapidly, your article should be no older than 2007 (i.e. Less than 5 years old).Summarize th..

  Solve the recurrence using the recursion trees method

Guess and prove by induction method - Solve the recurrence using the recursion trees method.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd