Analyze the fundamentals of pki

Assignment Help Computer Network Security
Reference no: EM131396221

Case Study: Public Key Infrastructure

Suppose you are the Information Security Director at a small software company. The organization currently utilizes a Microsoft Server 2012 Active Directory domain administered by your information security team. Mostly software developers and a relatively small number of administrative personnel comprise the remainder of the organization. You have convinced business unit leaders that it would be in the best interest of the company to use a public key infrastructure (PKI) in order to provide a framework that fosters confidentiality, integrity, authentication, and nonrepudiation. Email clients, virtual private network (VPN) products, Web server components, and domain controllers would utilize digital certificates issued by the certificate authority (CA). Additionally, the company would use digital certificates to sign software developed by the company in order to demonstrate software authenticity to the customer.

Write a two to three page paper in which you:

1. Analyze the fundamentals of PKI, and determine the primary ways in which its features and functions could benefit your organization and its information security department.

2. Propose one way in which the PKI could assist in the process of signing the company's software, and explain the main reason why a customer could then believe that software to be authentic.

3. Compare and contrast public and in-house CAs. Include the positive and negative characteristics of each type of certificate authority, and provide a sound recommendation of and a justification for which you would consider implementing within your organization. Explain your rationale.

4. Use at least three quality resources in this assignment (no more than 2-3 years old) from material outside the textbook. Note: Wikipedia and similar Websites do not qualify as quality resources.

Your assignment must follow these formatting requirements:

• Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. Check with your professor for any additional instructions.

• Include a cover page containing the title of the assignment, the student's name, the professor's name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length.

The specific course learning outcomes associated with this assignment are:

• Explain how businesses apply cryptography in maintaining information security.
• Use technology and information resources to research issues in information systems security.
• Write clearly and concisely about network security topics using proper writing mechanics and technical style conventions.

Reference no: EM131396221

Questions Cloud

Can a california state court exercise personal jurisdiction : Can a California state court exercise personal jurisdiction over the New York defendants in this case? What factors will the court consider in deciding this question and Do the Blues have standing in this case? Why or why not?
Criticize the given definitions - truculent : Criticize the following definitions in light of the eight rules for lexical definitions:- "Truculent" is if you're cruel or fierce.
Opportunity cost of producing a car in saudi arabia : The opportunity cost of producing a car in Saudi Arabia is ______ million barrels of oil. The opportunity cost of producing a car in the United States is _______ million barrels of oil.
How computer programs make decisions : Is it ethical for insurance companies to access your health records and then make insurance decisions about you?
Analyze the fundamentals of pki : Analyze the fundamentals of PKI, and determine the primary ways in which its features and functions could benefit your organization and its information security department.
Write a summary of two page about nanocomposites : Write a summary of two page about Nanocomposites
Criticize the given definitions - a house is a structure : Criticize the following definitions in light of the eight rules for lexical definitions:- A house is a structure made of wood or stone intended for human habitation.
Purchasing agent for a municipality : The purchasing agent for a municipality has contracted with a local car dealer to purchase four cars. The dealer has 25 cars on his lot; 10 red, 7 blue, 6 white, and 2 purple.
When an organization is preparing to outsource : When an organization is preparing to outsource and staff may/could lose their positions, what do you think is their biggest need from the organization?

Reviews

Write a Review

Computer Network Security Questions & Answers

  Design a remote access control policy for richman

Design a remote access control policy for Richman using the appropriate access controls for systems, applications, and data access. Include the design and justification for using the selected access controls for systems, applications, and data acc..

  The discussion board is part of the core of online

the discussion board is part of the core of online learning. classroom discussion in an online environment requires

  Ip security and attacksnbspbased on your understanding of

ip security and attacksnbspbased on your understanding of networking concepts create a 2- to 3-page report in a

  Discuss specific malware and social engineer

Explain your method of attack and operation within reasonable parameters of the law. Discuss specific malware, social engineer, or any other type of attacks you would deploy to achieve your desired goals.

  What is access control

What is Access Control? What is SSO and what are some of parts and types of Access Control?

  Computer security incident

Locard's Exchange Principle, electronic crime scene, modules or DLLs a process, router forensics, Configuration and user, Local logs process and memory, Network Information, File system, Portray the NTP vulnerability of some Cisco IOS routers

  Design an algorithm to achieve the byzantine agreement

Design an algorithm to achieve the Byzantine Agreement for the case that there are four processes, amongst which one is corrupted. You should not use public key cryptography for your algorithm (200 words)

  Mandatory access control and discretionary access control

Explain in your own words the elements of the following methods of access control: Mandatory access control (MAC), Discretionary access control (DAC) and Role-based access control (RBAC)

  Discuss symmetric and asymmetric key encryption

A short introduction to SSH, explaining why it is the preferredway of logging into a remotemachine-this explanation will need to discuss symmetric and asymmetric key encryption.

  Cost-of-use issues are of client-dominant local area network

What technology and cost-of-use issues are associated with a client-dominant local area network? Think about what happens as the network grows in size.

  Performance measurement guide to information security

Performance Measurement Guide to Information Security. Using this document, identify five measures you would be interested in finding the results from based on your home computing systems and/or network.

  Build a computer using a list of unique specifications

Build a computer using a list of unique specifications and troubleshoot any problems that may come up during the building process.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd