Reference no: EM132339831
To earn full credit for the discussions, you must do the following:
Public Key Infrastructure (PKI) is a combination of software, hardware, and policies used to secure communications over an insecure medium. PKI can also provide a system that allows validation of credentials, known as digital signatures, that are the cornerstone of the system.
Please explain the PKI process and identify the PKI structure to include the major roles.
As it relates to certificates in the real world, what is X.509 and why is it important?
What are some issues that we should be aware of when building and using PKI Infrastructure?
"NO PLAGIARISM"
Learning Materials and References (posted by prof)
Required Resources Textbook(s) Required:
Oriyano, Sean-Philip. Cryptography Infosec Pro Guide. McGraw-Hill Education, 2013.
Recommended Materials/Resources
Please use the following author's names, book/article titles, Web sites, and/or keywords to search for supplementary information to augment your learning in this subject.
Harris, Shon. All in One CISSP Exam Guide, Sixth Edition. McGraw-Hill, 2013.
Paar, Christof, Pelzl,Jan and Preneel, Bart. Understanding Cryptography: A Textbook for Students and Practitioners. Springer Publishing, 2010.
Rhodes-Ousley, Mark. The Complete Reference to Information Security, Second Edition. McGraw-Hill, 2013.