Compare and contrast the trust models-pgp, Computer Network Security

a. PKI and PGP are two methods for generating and managing public keys for use in protocols such as secure email. Compare and contrast the trust models for public keys used in PKI and PGP, and assess the statement that a PKI is a "topdown" approach to trust and PGP is a "bottom-up" approach to trust.

b. The SSL protocol uses (X.509) certificates to create a secure session between a server and a client in a web session. Discuss the browser-based trust model assumed in SSL, and compare it with the trust model used in Kerberos. Kerberos is designed to operate is a relatively small domain, such as a single company. Discuss the practical issues around extending the Kerberos trust model to a global scale; say to provide secure services between Amazon and its customer base.

c. Both IPsec and SSL provide encrypted network communication, but at different layers in the Internet protocol stack, and for different purposes. Compare and contrast these two protocols, and describe the secure communication scenarios they are best suited to address.

Tasks:

a. Compare and contrast the trust models

b. Compare and contrast the trust models; discuss details on implementing Kerberos on a large scale

c. Compare and contrast the protocols; provide examples of best suited scenarios

 

Posted Date: 3/6/2013 4:08:14 AM | Location : United States







Related Discussions:- Compare and contrast the trust models-pgp, Assignment Help, Ask Question on Compare and contrast the trust models-pgp, Get Answer, Expert's Help, Compare and contrast the trust models-pgp Discussions

Write discussion on Compare and contrast the trust models-pgp
Your posts are moderated
Related Questions
The project will be involving a design and a report of which explain the simulation and how it functions. The aim of the project is to help the administrators and staff at the war

Question: (a) What are the various options to mitigate risks in an Information Security Management System (ISMS)? For each option specify an instance where it can be used.

MegaCorp INC. is a large manufacturing firm that operates 5 factories in Dallas, 4  factories in Los Angeles, and 5 factories in Albany, New York.  It operates a tightly  connected

Question (a) Name 3 popular electronic mail access protocols? (b) i. What is DNS? ii. Briefly, describe what it does and how it works? iii. Why does DNS use a dist

Mapping between a hardware address and a protocol address is known Address Resolution. A router or host uses address resolution when it requires to transmit a packet to another dev

Access Controls Access controls addresses admission of a user into a trusted area of organization. It comprises of a combination of policies & technologies. The ways to control

Question 1 (a) Explain briefly the following terms as used in network security: (i) Denial of service (DoS) attack (ii) Birthday attack (iii) DeMilitarized Zone

Normal 0 false false false EN-US X-NONE X-NONE

RING topology all computers are connected in loop. A ring topology is a network topology in which every node connects to exactly two other devices, forming a single continuous pa

?Examples should include direct costs items, indirect costs items, as well as variable costing. ?What are at least 5 types of expenses that are associated with manufacturing the