1. Public Keys and Public Certificates can be stored in the Central Repository. It is not the same as the Public Key Infrastructure, but it is not the same.
2. Decryption key
3. Authentication Header is used to prove the identity of the sender and ensure the data is not tampered with. A Encapsulated Security Payload provides authentication and encryption and encrypts the IP packets and ensures their integrity.
4.
1. Create Enrollment Object
2. Set Enrollment Parameters
3. Create Request
4. Submit Request
5. Process request
6. Get Certificate
7. Accept Certificate
5. Some of the advantages are: Straight-forward Concept, Chain-length limit, and less time to obtain a usable certificate within the CA
Some of the disadvantages are: Scalability, Single point of trust, and …show more content…
still need an impeccable CA.
6.
1. Define Certificate Requirements – this illustrates the value of the info that you want to protect, as well as the costs involved with implementing a strong security system
2. Determine Digital Signatures and Secure Email – ways to prevent intruders from monitoring activity
3. Determining Certificate requirements – types of certificates to be issued and the number of users computers and applications that need certificates.
4. Document Certificate Policies and Practices – things such as how users are authenticated to the CA and intended purpose of the certificate
5.
Designing CA infrastructure – establishing a framework of linked CAs that are responsible for issuing, validating, renewing and revoking certificates as needed.
7.
1. Determine what databases will be used for PKI?
2. What are the legal and policy considerations for the C-I-A?
3. Who will have access to the systems and how will this access be monitored?
8. The main function of the certutil.exe command line tool is to display information about the digital certificates that are installed on a direct access client, direct access server or intranet resource.
9. An open-source implementation of the SSL and TLS protocols. The core library, written in the C programming language, implements the basic cryptographic functions and provides various utility functions.
10. Single sign-on (SSO) is a property of access control of multiple related, but independent software systems. With this property a user logs in once and gains access to all systems without being prompted to log in again at each of them. Microsoft SharePoint Server
11. True
12. Relate back to the C-I-A tenets of information systems security. Hashing provides file versioning while encryption provides file
security
13. SHA-1, It is more secure.
14. True
15. True