Sign In
Not register? Register Now!
Pages:
2 pages/β‰ˆ550 words
Sources:
4 Sources
Style:
APA
Subject:
Technology
Type:
Essay
Language:
English (U.S.)
Document:
MS Word
Date:
Total cost:
$ 12.15
Topic:

ITM517 MOD03 Discussion: Public Key Infrastructure

Essay Instructions:

Public Key Infrastructure
Read the chapter on Public Key Infrastructure (PKI) here, http://flylib(dot)com/books/en/3.41.1.110/1/. Discuss one of the following: 
Explain how public key infrastructure work. Provide an example of how to obtain a server certificate.
• Please use original writing (No Plagerism)
• Please use American URLs than can be easily verified on the web on the reference page.
• Please include the page numbers in the references

Essay Sample Content Preview:

Public Key Infrastructure (PKI)
Name:
Institution
Course Title:
Instructor:
Date:
Public Key Infrastructure (PKI)
Introduction
With the increasing cybercrime, additional security is required. Identify other persons on the internet has become one of the main challenges that users of internet face. Security measures, therefore, need to be taken whenever confidential information is being exchanged. So far, the best solution to this kind of problem is the use of Public Key Infrastructure (PKI). This is a third party agency that helps one identify the other party on the internet. This essay defines a public key infrastructure, explains how it works and provides an example of how to obtain a server certificate.
Public Key Infrastructure (PKI)
A Public Key Infrastructure (PKI) is a set of software, hardware, standards and policies that support the creation, distribution, administration and revocation of digital certificates and public encryption keys. It enables the computers and the users to perform authentication and exchange data securely over the internet and other networks (Techtarget.com, 2014). It is preferred over other forms of security because it not only ensures data security through encryption but also assures authentication.
How public key infrastructure work
A complex PKI utilizes many CAs with the main root CA. Root Certificate Authority (CA) is a trusted party whose services authenticates other computers, individuals, and other entities. It holds a certificate that is self-signed. It issues certificates to the other CAs (Younglove, 2000). The subordinate CAs issue certificates to the Registration Authorities. Registration Authority is also referred as a subordinate Certificate Authority. It identifies or authenticates special users as permitted by the Certificate Authority. Certificate Database is where storage of certificate requests takes place. The database also issues and revokes certificates. Certificate Store is a place where the issue private keys and certificates are stored. Every user is...
Updated on
Get the Whole Paper!
Not exactly what you need?
Do you need a custom essay? Order right now:

πŸ‘€ Other Visitors are Viewing These APA Essay Samples:

HIRE A WRITER FROM $11.95 / PAGE
ORDER WITH 15% DISCOUNT!