Preview

Nt1310 Unit 8 Lab 1

Satisfactory Essays
Open Document
Open Document
421 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Nt1310 Unit 8 Lab 1
Unit 8 Lab 1
1. Public Keys and Public Certificates can be stored in the Central Repository. It is not the same as the Public Key Infrastructure, but it is not the same.
2. Decryption key
3. Authentication Header is used to prove the identity of the sender and ensure the data is not tampered with. A Encapsulated Security Payload provides authentication and encryption and encrypts the IP packets and ensures their integrity.
4.
1. Create Enrollment Object
2. Set Enrollment Parameters
3. Create Request
4. Submit Request
5. Process request
6. Get Certificate
7. Accept Certificate
5. Some of the advantages are: Straight-forward Concept, Chain-length limit, and less time to obtain a usable certificate within the CA
Some of the disadvantages are: Scalability, Single point of trust, and
…show more content…

Designing CA infrastructure – establishing a framework of linked CAs that are responsible for issuing, validating, renewing and revoking certificates as needed.

7.
1. Determine what databases will be used for PKI?
2. What are the legal and policy considerations for the C-I-A?
3. Who will have access to the systems and how will this access be monitored?
8. The main function of the certutil.exe command line tool is to display information about the digital certificates that are installed on a direct access client, direct access server or intranet resource.
9. An open-source implementation of the SSL and TLS protocols. The core library, written in the C programming language, implements the basic cryptographic functions and provides various utility functions.
10. Single sign-on (SSO) is a property of access control of multiple related, but independent software systems. With this property a user logs in once and gains access to all systems without being prompted to log in again at each of them. Microsoft SharePoint Server
11. True
12. Relate back to the C-I-A tenets of information systems security. Hashing provides file versioning while encryption provides file


You May Also Find These Documents Helpful

  • Powerful Essays

    Nt1310 Unit 9

    • 1048 Words
    • 5 Pages

    It shields the upper layer protocol from being aware of the physical medium to be used in the communication.*…

    • 1048 Words
    • 5 Pages
    Powerful Essays
  • Good Essays

    • Authentication – the process for “trust” connection establishing between the server and the applier;…

    • 767 Words
    • 4 Pages
    Good Essays
  • Good Essays

    References: Ballad, B. Ballad, T. and Banks, Erin. Access Control, Authentication, and Public Key Infrastructure. 2011. Jones and Bartlett Learning…

    • 575 Words
    • 2 Pages
    Good Essays
  • Good Essays

    Unit 2 Assignment 2

    • 676 Words
    • 3 Pages

    2. We have identified a vulnerability in the Internet Public Key Infrastructure (PKI) used to issue digital certificates for secure websites. As a proof of concept we executed a practical attack scenario and successfully created a rogue Certification Authority (CA) certificate trusted by all common web browsers. This certificate allows us to impersonate any website on the Internet, including banking and e-commerce sites secured using the HTTPS protocol.…

    • 676 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Nt1330 Unit 7 Lab 1

    • 566 Words
    • 3 Pages

    3: In the ETC folder is a file called hosts, open this file with notepad (double click then open with…

    • 566 Words
    • 3 Pages
    Good Essays
  • Good Essays

    lab 8 Access Controls

    • 943 Words
    • 4 Pages

    Supports cross-certification of other CA server hierarchies on the Enterprise Corporate Private Enterprise private network.…

    • 943 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    07: Password and Ref

    • 4381 Words
    • 33 Pages

    Authentication is the process of ensuring that the individuals trying to access the system are who they claim to be.…

    • 4381 Words
    • 33 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Nt1310 Unit 2 Lab

    • 353 Words
    • 2 Pages

    A problem that I think needs to be solved is traffic lights causing the back up of traffic. Traffic lights cause a delay in traffic and cause for traffic back up. It causes everyone to be late when there is no need for it. From personal experience I have been late of several occasions due to backed up traffic because of traffic lights. There are certain spots where traffic lights are not needed and they are only backing up traffic more than needed. Traffic lights turn red even when there is no traffic at the other end of the light. Traffic lights also cause a lot of accidents, such as someone running a red light, etc.…

    • 353 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Authentication in definition is simply proof that something is real or what it is meant to be. Public networks as well as private networks to include the internet use passwords as authentication to authorize logins. Data is required and is filtered through the password database if an effort to ensure that the user is authentic. Also, before anyone is allowed to access an organization’s intranet they must first be registered by someone that has the appropriate credentials to authorize them to gain access. There are plenty of businesses and alternative in the need of additional authentication methods and one method worthy of mentioning is the utilization of digital certificates issued and verified by a Certificate Authority or as commonly used the acronym CA.…

    • 1478 Words
    • 5 Pages
    Powerful Essays
  • Good Essays

    Unit 8 Assignment

    • 594 Words
    • 3 Pages

    e. ___Encryption______ is the use of an algorithm to scramble data into a format that can be read only by reversing the algorithm.…

    • 594 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Finance Questions

    • 600 Words
    • 2 Pages

    7. For each of the seven domains of a typical IT infrastructure, what process or procedures would you perform to obtain information about security controls and safeguards?…

    • 600 Words
    • 2 Pages
    Good Essays
  • Good Essays

    Cited: Ballad, B. B. (2011). Access Control, Authentication, and Public Key Infrastructure. Burlington: Jones & Bartlett Learning.…

    • 630 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Cac Card

    • 1716 Words
    • 7 Pages

    Public key infrastructure (pki) certificates that enable cardholders to "sign" documents digitally, encrypt and decrypt emails, and establish secure online network connections.…

    • 1716 Words
    • 7 Pages
    Good Essays
  • Good Essays

    The specification suite also provides a mechanism to optionally support encryption of identity data, discovery of the OpenID Providers, and advanced session management, including logout.…

    • 417 Words
    • 2 Pages
    Good Essays
  • Good Essays

    Public-Key Cryptography for Initial Authentication in Kerberos (PKINIT) enables the use of public-key cryptography for an initial authentication between the authenticated client and its local KDC (Key Distribution Center). The purpose of PKINIT is to secure the transmission of ticket…

    • 971 Words
    • 4 Pages
    Good Essays