Public Key Infrastructure

In: Computers and Technology

Submitted By kymisam
Words 335
Pages 2
Case Study 2: Public Key Infrastructure
Due Week 6 and worth 50 points

You are the Information Security Officer at a small software company. The organization currently utilizes a Microsoft Server 2008 Active Directory domain administered by a limited number of over-tasked network administrators. The remainder of the organization comprises mostly software developers and a relatively small number of administrative personnel. The organization has decided that it would be in its best interest to use a public key infrastructure (PKI) to provide a framework that fosters confidentiality, integrity, authentication, and nonrepudiation. Email clients, virtual private network products, Web server components, and domain controllers would utilize digital certificates issued by the certificate authority (CA). Additionally, digital certificates would be used to sign software developed by the company to demonstrate software authenticity to the customer.

Write a two to three (2-3) page paper in which you: 1. Identify and analyze the fundamentals of PKI. 2. Analyze positive and negative characteristics of a Public and In-house CA. 3. Provide a sound recommendation for either a Public CA or an In-house CA.

Your assignment must follow these formatting requirements: * Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. Check with your professor for any additional instructions. * Include a cover page containing the title of the assignment, the student’s name, the professor’s name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length.

The specific course learning outcomes associated with this assignment are: * Explain how businesses apply cryptography in…...

Similar Documents

It Infrastructure

...In an IT infrastructure, domains there can be many threats that can take down your system. There is a threat out there that can harm our system, which we need to address. I feel that our system can be improved for better security and be protective from outside threat. This report is to inform you of the domains that can be affected by outside threat. In addition, people should know when dealing which company property and data that there no room for error. Next to properly handle company data when dealing with customer information. I feel that educating our employee would cut back on human error and keep the data safe. User domain can be defined, as the access point was the person meets the computer. The person can access the system through this point depending on the level of access that have. We would need to put in an “Acceptable Use Policy” it would give the employee the information on how to handle company assets. Now there would be certain measure to where we give access to employee, but that would be handling in the hiring process. With this information, the employee would be responsible for his or her action when handling sensitive data. That would ensure that company data would be safe when an employee logged on to the system. The User Domain is the weakest access point and employee should understand that. Next is the “Workstation Domain” is the device to where a user can access the company system. Only employees with the right access should be using these......

Words: 429 - Pages: 2

Public Key Infrastructure

...Public Key Infrastructure David Croughwell Prof. George Danilovics Networking Security Fundamentals (CIS333) 17 February 2013 Public Key Infrastructure In discussing the Public Key Infrastructure (PKI) we need to discuss the differences between asymmetric and symmetric keys. These two keys differ in how they are distributed to the various parties that would like to transfer information. Symmetric can be completed by hand delivery, transmitting the key encrypted with a public key, or through a secure connection. This symmetric key or “private key” is used by both parties for encryption and decryption, this method once the key is obtained is the faster of the two and the most secure. Private keys can also be incorporated with hardware devices which will also increase the speed in which the encryption/decryption takes place. Asymmetric keys or “public keys” are a combination of private keys and public keys, since in circumstances the individual receiving the file would have no other ways of receiving the private key securely. This requires a key that is generated so that it can be linked with the private key, being linked like this allows you to post the public key to certificate authorities who will verify that the two keys come from the individual that you expected. The means of identifying who you are can be handled by a third-party corporation. This is completed by utilizing a digital signature which is the equivalent of a handwritten signature. This tells......

Words: 915 - Pages: 4

Public Schools Play a Key Role

...Response on-Public schools play a key role Public schools is also refer to primary or secondary schools mandated for or offered to all children without charge, funded in whole or in part by taxation. It may also refer to public institutions of post-secondary education  funded and overseen by the government from around the world. In Malaysia however it is also the most important steps of education for majority of the students in Malaysia. It is the genesis for most of the knowledge, experience, education obtained by the students. Which is why it plays a key role in student development. For that itself to happen the public schools must retain the key traits that makes a public school such a nice place to learn for the students. And here are some of the reasons why? Firstly, the subjects available for the students must be limited in both the primary and secondary school. Which is five for the primary school for example: English, Malay, Science ,Geography & Mathematics. Whereas in secondary school subjects from primary schools must be carried on to secondary schools including the extra two subjects that must be emphasized which is History and Living Skills. All those subjects will allow the students to chase after their preferred occupation in the near future and become the next leader for tomorrow. Secondly, teachers also plays a important role in public schools because without them the students will have no source of knowledge to learn and absorb. The teachers......

Words: 897 - Pages: 4

Infrastructure

...India Power Sector Reforms Update ____________________________________________________________ __________________________ India Power Sector Reforms Update Issue IV August 2002 (Updates in the period: June 2002 to August 2002) India power sector reforms update is a joint initiative of Prayas, an Indian NGO based in Pune, working on power sector issues for a decade and Public Services International (PSI) which is an international trade union federation, uniting public sector workers in more than 500 trade unions in over 140 countries. Our aim is to monitor the power sector developments in three Indian states of Orissa, Andhra Pradesh and Uttar Pradesh. This is the fourth issue of the update covering three months period from June 2002 to August 2002. First issue was a detailed historical overview covering up to October 2001; second update covered the period from October 2001 to January 2002 while the third update covered February 2002 to May 2002. For better understanding it would be desirable if readers also read the earlier updates. Please direct your suggestions and comments to PSI at psiru@psiru.org. Contents Part I: Overview of the Indian Power Sector Part II: Orissa 1. 2. 3. 4. State Overview Regulatory Intervention Private Sector Generation Private Sector Distribution Part III: Andhra Pradesh 1. 2. 3. 4. 5. State Overview Regulatory Intervention State and Central Utilities Private sector Generation Employees and CSIs Part IV: Uttar Pradesh 1. State...

Words: 5753 - Pages: 24

Infrastructure

...through an unsecured site leading to the disclosure of business sensitive and companywide strategic information pertaining current contract negotiations and company mergers. IDI CIO has enlisted the help of an Information Systems Infrastructure Architect and An Information Systems Security Specialist to investigate and recommend improvements to IDI’s IT Infrastructure. To date, IDI’s network weaknesses out way the network strengths. The larger of the weaknesses is that IDI has no secondary locations in the event of a large scale disaster. Second to that is the lack of security implementations at some of the sites, i.e., Remote access to the Warsaw office runs through a completely unsecure channel and the blatant disregard for adherence to network security policies at the home office. Further evaluations of some of IDI sites have led us to come up with a fairly comprehensive plan to fix and mitigate and major issues that may arise in the future. Our greatest challenge will be to ensure that all sites are working towards the same goal using the same equipment. We are driven to set IT standards which will help us: * Avoiding technological dead ends * Reducing dependency on outside vendors * Promote universality San Paulo’s infrastructure is going to be the basis for the rest of the sites. We recommend that each site have the following hardware and software setups: * Microsoft Windows 2008 Server R2 * Microsoft Exchange 2010 * Microsoft......

Words: 3151 - Pages: 13

Cis 333 Case Study 2 Public Key Infrastructure

...CIS 333 Case study 2 Public Key Infrastructure http://homeworktimes.com/downloads/cis-333-case-study-2-public-key-infrastructure/ For More Tutorial Visit: http://homeworktimes.com/ For any Information Email Us: : onlineeducationalservice@gmail.com CIS 333 Case study 2 Public Key Infrastructure http://homeworktimes.com/downloads/cis-333-case-study-2-public-key-infrastructure/ For More Tutorial Visit: http://homeworktimes.com/ For any Information Email Us: : onlineeducationalservice@gmail.com CIS 333 Case study 2 Public Key Infrastructure http://homeworktimes.com/downloads/cis-333-case-study-2-public-key-infrastructure/ For More Tutorial Visit: http://homeworktimes.com/ For any Information Email Us: : onlineeducationalservice@gmail.com CIS 333 Case study 2 Public Key Infrastructure http://homeworktimes.com/downloads/cis-333-case-study-2-public-key-infrastructure/ For More Tutorial Visit: http://homeworktimes.com/ For any Information Email Us: : onlineeducationalservice@gmail.com CIS 333 Case study 2 Public Key Infrastructure http://homeworktimes.com/downloads/cis-333-case-study-2-public-key-infrastructure/ For More Tutorial Visit: http://homeworktimes.com/ For any Information Email Us: : onlineeducationalservice@gmail.com CIS 333 Case study 2 Public Key Infrastructure http://homeworktimes.com/downloads/cis-333-case-study-2-public-key-infrastructure/ For More Tutorial Visit: http://homeworktimes.com/ For any Information......

Words: 544 - Pages: 3

On Implementation of Elliptic Curve Cryptography and Self-Certified Public Key Cryptosystems in Wireless Mesh Networks

...On Implementation of Elliptic Curve Cryptography and Self-Certified Public Key Cryptosystems in Wireless Mesh Networks A B.Tech Project Report submitted in fulfilment of the requirements for the Degree of Bachelor of Technology Submitted by K Bharadwaj Sharma 07010219 M Krishna Chaitanya 07010228 Under the Guidance of Dr.Ratnajit Bhattacharjee Department of Electronics and Electrical Engineering Indian Institute of Technology Guwahati Guwahati-781039, Assam i Candidate’s Declaration I hereby declare that the work which is being reported in this thesis entitled “ On Implementation of Elliptic Curve Cryptography and self-certified public key cryptosystems in Wireless Mesh Networks “ in partial fulfilment of the requirements for the award of the Degree of Bachelor of Technology, submitted in the Department of Electronics and Communication Engineering, Indian Institute of Technology Guwahati, is a record of my own work carried out during my thesis work under the supervision of Dr.Ratnajit Bhattacharjee, Associate Professor, Department of EEE, IIT Guwahati. The matter entitled in this thesis has not been submitted elsewhere for the award of any other degree. Place: Guwahati Date: 21st April, 2011 This is to certify that the above statement made by the candidate is correct to the best of my knowledge. April,2011 IIT Guwahati ` Supervisor: Dr. Ratnajit Bhattacharjee Associate Professor Dept. of EEE IIT Guwahati ii ACKNOWLEDGEMENT First and foremost...

Words: 7761 - Pages: 32

Infrastructure

...Infrastructure and Economic Development in Africa Infrastructure and Economic Development in Africa 2014 Mohamed Salah Abdel Rehim 10200210 12/21/2014 2014 Mohamed Salah Abdel Rehim 10200210 12/21/2014 Presented to: Dr. Azza El Sharabasy Course: Economic Development Presented to: Dr. Azza El Sharabasy Course: Economic Development Table of contents * Introduction * Literature review * Africa’s infrastructure endowment * Ways of financing infrastructure * Impact of Infrastructure on Economic Growth. * Conclusions and recommendations * References Introduction * Generally, a consensus has developed that, under the right circumstances, infrastructure evolution can play a major role in improving growth and equity-and, through those two channels, help to eradicate poverty. * However, in spite of this acknowledged aspects and their importance, sub Saharan Africa “SSA” falls behind other regions in infrastructure services and its quality, and this gap is increasing over time. * This is intensely showed in the energy sector, with around 800 million population, the 48 sub Saharan Africa countries produce all together about as much power as Spain, which has only 5.5% of the population of the SSA countries. * Investment in maintaining the current infrastructure is also lagging behind, leaving many African countries with deteriorated and inefficient infrastructure services;......

Words: 2755 - Pages: 12

Public-Key Encryption

... Public-key Encryption David Burianek Saint Leo University Network Theory & Design COM-309 Dr. Eduardo Bautista August 01, 2014 Public-key Encryption Intent The intent of this paper is to present the reader with an explanation of Public-key encryption without delving too deeply into the math behind encryption schemes to better facilitate understanding for the layperson. Introduction Cryptography is a fascinating world that predates computers. Beginning in ancient times through the revolutionary period and into modern times, there have been many schemes to protect sensitive data. Notable technics are George Washington's book-key ciphers, Thomas Jefferson’s ‘cylinder,’ (Menezes, Van Oorschot, & Vanstone, 1997, p. 243) and the Nazi Enigma Machine of World War II. (Piper & Murphy, 2002) There has always been a need to have secure communications and the ability to safeguard data that has been intercepted. Modern Cryptology is an art form that uses the science of mathematics in order to provide secrecy, authenticity, and security in the transport of data. “Cryptology also enables us to create trust relationships over open networks; more in general, cryptographic protocols allow mutually distrusting parties to achieving a common goal while protecting their own interests.” (Furnell, Katsikas, Lopez, & Patel, 2008, p. 105) The methods by which these transactions can occur are many; however, they can be broken down into two categories; symmetric key encryption...

Words: 3477 - Pages: 14

Public-Key Encryption

...Public-key Encryption Saint Leo University Network Theory & Design COM-309 Dr. Eduardo Bautista August 01, 2014 Public-key Encryption Intent The intent of this paper is to present the reader with an explanation of Public-key encryption without delving too deeply into the math behind encryption schemes to better facilitate understanding for the layperson. Introduction Cryptography is a fascinating world that predates computers. Beginning in ancient times through the revolutionary period and into modern times, there have been many schemes to protect sensitive data. Notable technics are George Washington's book-key ciphers, Thomas Jefferson’s ‘cylinder,’ (Menezes, Van Oorschot, & Vanstone, 1997, p. 243) and the Nazi Enigma Machine of World War II. (Piper & Murphy, 2002) There has always been a need to have secure communications and the ability to safeguard data that has been intercepted. Modern Cryptology is an art form that uses the science of mathematics in order to provide secrecy, authenticity, and security in the transport of data. “Cryptology also enables us to create trust relationships over open networks; more in general, cryptographic protocols allow mutually distrusting parties to achieving a common goal while protecting their own interests.” (Furnell, Katsikas, Lopez, & Patel, 2008, p. 105) The methods by which these transactions can occur are many; however, they can be broken down into two categories; symmetric key encryption......

Words: 3473 - Pages: 14

Cis 333 Wk 6 Case Study 2 Public Key Infrastructure

...CIS 333 WK 6 CASE STUDY 2 PUBLIC KEY INFRASTRUCTURE To purchase this visit here: http://www.activitymode.com/product/cis-333-wk-6-case-study-2-public-key-infrastructure/ Contact us at: SUPPORT@ACTIVITYMODE.COM CIS 333 WK 6 CASE STUDY 2 PUBLIC KEY INFRASTRUCTURE CIS 333 WK 6 Case Study 2 - Public Key Infrastructure You are the Information Security Officer at a small software company. The organization currently utilizes a Microsoft Server 2008 Active Directory domain administered by a limited number of over-tasked network administrators. The remainder of the organization comprises mostly software developers and a relatively small number of administrative personnel. The organization has decided that it would be in its best interest to use a public key infrastructure (PKI) to provide a framework that fosters confidentiality, integrity, authentication, and nonrepudiation. Email clients, virtual private network products, Web server components, and domain controllers would utilize digital certificates issued by the certificate authority (CA). Additionally, digital certificates would be used to sign software developed by the company to demonstrate software authenticity to the customer. Write a two to three (2-3) page paper in which you: 1. Identify and analyze the fundamentals of PKI. 2. Analyze positive and negative characteristics of a Public and In-house CA. 3. Provide a sound recommendation for either a Public CA or an In-house CA. Activity mode aims...

Words: 766 - Pages: 4

The Key Challenges to Providing Leadership During Public Health Crises.

...TM5563: Public Health Leadership and Crisis Management | The key challenges to providing leadership during public health crises.Assignment One | Samantha Leggett: SN 12494652 | 9/16/2011 | TM5563 Public Health Leadership and Crisis Management Assignment One Introduction This assignment will define leadership and explore the traits and qualities that are deemed to be inherent to effective leadership and an explanation given for why leadership matters in times of crisis. The key challenges to leadership in both sudden and expected crises will be explored and potential solutions to these key challenges offered. Examples will be provided throughout using recent public health crises to illustrate. Leadership can typically be defined by the traits, qualities and behaviours of a leader. It has also been described as a process with a shifting locus of control in which leaders are not seen as individuals in charge of followers but as members of a “community of practice” where everyone involved in the activity is assumed to play an active role in leadership. However, even with an advanced team, there is still a need for distinct leadership to enable the whole team to be optimally successful. 1-3 It would appear that there are a number of key traits that good leaders possess, however the literature provides little concrete agreement on a finite number of these: Kambil et al. (2009) found that leaders have five key traits: Curiosity; courage - in willingness to face......

Words: 4751 - Pages: 20

Infrastructure

...INFRATSRUCTURE The Eleventh Five Year Plan emphasized the need for removing infrastructure bottlenecks for sustained growth. It, therefore, proposed an investment of US $500 billion in infrastructure sectors through a mix of public and private sectors to reduce deficits in identified infrastructure sectors. As a percentage of the gross domestic product (GDP), investment in infrastructure was expected to increase to around 9 per cent. For the first time the contribution of the private sector in total investment in infrastructure was targeted to exceed 30 per cent. Total investment in infrastructure during the Eleventh Plan is estimated to increase to more than 8 per cent of GDP in the terminal year of the Plan --higher by 2.47 percentage point s a s c ompa red t o the Tenth Pl an. The private sector is expected t o be contributing nearly 36 per cent of this investment. RAILWAYS Some of the major goals set for Vision 2020 in the document include (a) laying of 25,000 km of new lines; (b) quadrupling of the 6,000 km network with segregation of passenger and freight lines; (c) electrification of 14,000 km; (d) completion of gaugeconversion; (e) upgradation of speed to 160-200 kmph for passenger trains; and (f) construction of 2,000 km of high-speed rail lines. • Freight performance: Freight loading on Indian Railways during April-November 2011 was 618.0 MT as compared to 593.4 MT in April-November 2010, an increase of 4.14 per cent. •......

Words: 1202 - Pages: 5

Infrastructure

...Indian Infrastructure With all the battering that we do to the infrastructure sector, there is also some good news. First is that Gross Capital Formation in Infrastructure is increasing. The 10th Plan average was 5.1 per cent of GDP. It is expected to be 7.1 per cent in the 11th Plan and estimated to go up to 9.7 per cent in the 12th Plan. In the early 1990s, we used to envy China at 9 per cent, saying can we ever match China when we were doing 3 per cent. This is tremendous good news, where across shades of different political dispensation we have had a silent movement of the tectonic plates of India's infrastructure geoplates. To achieve this in the kind of polity and democracy we are, in a space of 15 years, has been a major structural shift. Second, private-public-partnership is above expectations. During the 10th Plan, 25 per cent of our infrastructure was through PPP. The 10th Plan was largely driven by telecom and the early power projects. In the 11th Plan, the target was 30 per cent, but we achieved 37 per cent and in the 12th Plan there is reasonable confidence that we will do 50 per cent. This is a major change in India's infrastructure development. In the 10th Plan, the investment was $220 billion, of which 25 per cent came through PPP. In the 11th Plan, it is almost $480-500 billion of that 37 per cent, and 50 per cent of $1,000 billion in the 12th Plan. The third is we constantly debunk the Planning Commission. India is one of the few countries that officially......

Words: 1722 - Pages: 7

Infrastructure

...GSICS Working Paper Series Infrastructure Development for the Economic Development in Developing Countries: Lessons from Korea and Japan Byoungki KIM No. 11 November 2006 Graduate School of International Cooperation Studies Kobe University Infrastructure Development for the Economic Development in Developing Countries: Lessons from Korea and Japan Byoungki KIM Abstract Infrastructure is indispensable to achieve the main development targets in developing countries, such as urbanization, industrialization, export promotion, equitable income distribution, and sustainable economic development. Late developing countries can benefit from previous development experience provided they choose the right model1. However, the relationship between infrastructure and economic growth is still frequently debated. This paper will examine the experience of Korea and Japan in infrastructure development for economic growth to acquire some valuable lessons that infrastructure development contributes to economic development in developing countries. 1. Introduction The lack of infrastructure is hindering the economic growth in many developing countries2. Infrastructure investment has the effects of contributing to increase the productivity and it is expected to contribute to future economic growth in developing countries where infrastructure is still insufficient. Therefore, infrastructure development is one of the most integral parts of the public policies in developing countries...

Words: 11379 - Pages: 46