Order Number |
636738393092 |
Type of Project |
ESSAY |
Writer Level |
PHD VERIFIED |
Format |
APA |
Academic Sources |
10 |
Page Count |
3-12 PAGES |
Part 1: using the internet and/or the library
Research and explain your answer to the following: explain how active directory implements pki. Be sure to detail the use of certificates, the use of keys, and key security.
Replace these words with 500 to 1,000 words. Then remove italics and change the color to black. See chapter 7 of your course textbook for guidance here. Some thoughts: first discuss what active directory is. Centralized database [explain] …. Directory of objects [explain] organizational units … containers … forests, trees, leaves … groups … global policies … users, resources … access control … novell netware.
Discuss what is pki? Form of access control … uses certificates … uses asymmetric cryptography … authenticates users … provides cia & nonrepudiation. Explain keys… key security …key distribution.
Part 2: research and explain the following
1) Give an example of a protocol that uses both public key and private key cryptography and explain how and why it does so.
Replace these words with 200 words. Then remove italics and change the color to black. I believe that chapter 7 of your course textbook for guidance here. Some thoughts: explain how each of these are a part of public and private key cryptography: smtps, s/mime, ssh, sftp, ssl, tls/ssl…kerberos, pgp, https, ipsec,
2) Gow are the public key and private key of an asymmetrical key set related? What about this relationship makes it a “one-way” process?
Some thoughts: replace these words with 200 words. Then remove italics and change the color to black. Explain that there is a mathematical relationship between the two keys that is such that only the specific key that decrypts can decrypt a particular encryption. Explain what the process is and how it can only one way.
References
Murphy, b. (2015). Sscp (isc)2 systems security certified practitioner official study guide, (1st, ed.). [vitalsource bookshelf online]. Retrieved from https://purdueuniversityglobal. Vitalsource.com/#/books/9781119059684/cfi/0!/4/2@100:0.00
Note: delete this line and all underlined text before submitting your assignment.
Assignment 7 grading rubric = 45 points
Assignment requirements | Points
Possible |
Points
Earned |
Part 1 | ||
Explain how active directory implements pki. Be sure to detail the use of certificates, the use of keys, and key security (500-1000 words) | 0–30 | |
Part 2 | ||
Give an example of a protocol that uses both public key and private key cryptography and explain how and why it does so. (200 or more words) | 0–5 |
How are the public key and private key of an asymmetrical key set related? What about this relationship makes it a “one-way” process? (200 or more words)