Preview

Public Key Infrastructure

Good Essays
Open Document
Open Document
634 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Public Key Infrastructure
Public Key Infrastructure
Strayer University
CIS 333 – Network Security Fundamentals
November 11, 2014

Public Infrastructure Key
The PKI is a set of hardware, software, procedures and people for the creation, distribution, storing and management of digital certificates. It also maintains the networking environment of an organization by providing management service which could enable digital signature capabilities. It also enabled the users of unsecure public network for exchanging and private cryptographic key pair in order to obtain and share a trusted authority between the management of an organization. For improving an organization, PKI includes use of digital signatures, certificate validation, and permission management service in order to implement a wide variety of enterprise solution within an organization.
The implementation of certification authority is primary way of PKI in which it could benefit an organization and Information security department by providing public key and authority. In this way, both organization and Information security department is benefited from the implementation of user keys. The web of trust is the second way in which PKI provides an alternative approach of public key information for enabling the issue digital certificates for user, applications and devices of an organization and Information security department. Establishment of leverage certification authentication is the third way which benefits an organization and Information security department by maintaining an auditable database of users in order to secure privacy histories of Information security department.
The development of Certification Authority is the way in which PKI could assist in the process of signing the company’s software by providing root of trust and services for the authentication of computers, individuals and other entities in a network. This is because, it saves certificate requests and issues certificates for signing the company’s



References: Vacca, Jhn R. (2004). Public key infrastructure: building trusted applications and Web services. CRC Press. p. 8. ISBN 978-0-8493-0822-2. Adams, Carlisle & Lloyd, Steve (2003). Understanding PKI: concepts, standards, and deployment considerations. Addison-Wesley Professional. pp. 11–15. ISBN 978-0-672-32391-1. Trček, Denis (2006). Managing information systems security and privacy. Birkhauser. p. 69. ISBN 978-3-540-28103-0.

You May Also Find These Documents Helpful

  • Better Essays

    Whitman, M., & Mattord, H. (2004). Information Security Policy. In Management of information security(Fourth ed., p. 154). Boston, Mass.: Thomson Course…

    • 2101 Words
    • 8 Pages
    Better Essays
  • Satisfactory Essays

    Nt1310 Unit 8 Lab 1

    • 421 Words
    • 2 Pages

    Designing CA infrastructure – establishing a framework of linked CAs that are responsible for issuing, validating, renewing and revoking certificates as needed.…

    • 421 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    This report gives a brief description the general security solutions planned for the safety of data and information that belongs to the organization. The outline will provide elements of a multi-layered security plan, and will indicate a general security solution for each of the seven domains of a typical IT infrastructure. Also I will describe a layer of security for each of the seven domains.…

    • 801 Words
    • 4 Pages
    Good Essays
  • Good Essays

    References: Ballad, B. Ballad, T. and Banks, Erin. Access Control, Authentication, and Public Key Infrastructure. 2011. Jones and Bartlett Learning…

    • 575 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    Richman Investment needs and new enterprise encryption strategy. This is for a more secure network. They are wanting to grow to 10,000 employees worldwide. Richman Investment wants to operate out of 20 different countries in the future. This is very easy to do but to have a secure network there are many things that would have to happen which will make this more difficult to do. Have a secure network takes a lot of work and has to be monitored 24 hours a day 7 days a week. There are many different ways to go about this topic the one I am going to pick is a public key infrastructure (PKI).…

    • 444 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    lab 8 Access Controls

    • 943 Words
    • 4 Pages

    1. Where can you store your public keys or public certificate files in the public domain? Is this the same thing as a Public Key Infrastructure (KI) server?…

    • 943 Words
    • 4 Pages
    Good Essays
  • Better Essays

    Cmgt400 Week3

    • 1493 Words
    • 6 Pages

    Security authentication is a hot topic in today 's business world. However, many people may have differing ideas when it comes to what security authentication actually is. This paper will address those perceptions in a straightforward and easy to understand manner.…

    • 1493 Words
    • 6 Pages
    Better Essays
  • Good Essays

    A secure and efficient protocol is used, ECC elliptic curve cryptography a public key cryptography…

    • 470 Words
    • 2 Pages
    Good Essays
  • Good Essays

    Csia 301 - Syllabus

    • 4678 Words
    • 19 Pages

    Prerequisite: CMIS 102. A comprehensive introduction to the protection of business information and the systems that support business processes. The objective is to identify common threats and attacks employed against Web-accessible applications, analyze the role of security models and architectures, explain the role of cryptography, and analyze issues related to security management and network security.…

    • 4678 Words
    • 19 Pages
    Good Essays
  • Powerful Essays

    The specific purpose of this paper is to describe the authentication process and to describe how this and other information security considerations will affect the design and development process for new information systems.…

    • 1478 Words
    • 5 Pages
    Powerful Essays
  • Satisfactory Essays

    NT2580

    • 1232 Words
    • 14 Pages

    Introduction to Information Security © ITT Educational Services, Inc. All rights reserved. Page 2 Key Concepts  Confidentiality, integrity, and availability (CIA) concepts  Layered security solutions implemented for the seven domains of a typical IT infrastructure …

    • 1232 Words
    • 14 Pages
    Satisfactory Essays
  • Good Essays

    lab 5

    • 718 Words
    • 3 Pages

    Explain the purpose of a Public Key Infrastructure (PKI) and give an example of how you would implement it in a large organization whose major concern is the proper distribution of certificates across many sites.…

    • 718 Words
    • 3 Pages
    Good Essays
  • Good Essays

    chapter01

    • 7053 Words
    • 24 Pages

    A PKI is made up of hardware, applications, policies, services, programming interfaces, cryptographic algorithms, protocols, users, and utilities.…

    • 7053 Words
    • 24 Pages
    Good Essays
  • Better Essays

    Therefore after adding more security to authentication, the effect is witnessed through reduction in the acceptance rate of users while increasing the usability. Consequently, it is very challenging to find the most secure system of authentication that the users can accept. Users are always seeking new features and applications whose interfaces will be easy to use. At the same time, these users express worries that the dangers continues to increase. In addition, the legislations continue to punch companies and manufacturers towards protection of their clients’…

    • 1097 Words
    • 5 Pages
    Better Essays
  • Good Essays

    Cryptography

    • 385 Words
    • 2 Pages

    PKI is the most common public key encryption systems and, in most cases, this relies on manual trust and key distribution.…

    • 385 Words
    • 2 Pages
    Good Essays