StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Week 6 Case Study 2 Submission - Assignment Example

Cite this document
Summary
With the current trends in technology, there is the emergence of complex systems, automated business transactions, and e-commerce applications that need the installation of complex and rigorous security measures. Public key cryptography is a security technology that is known for…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER97.3% of users find it useful
Week 6 Case Study 2 Submission
Read Text Preview

Extract of sample "Week 6 Case Study 2 Submission"

Cryptography Number: Lecturer: Introduction With the current trends in technology, there is the emergence of complex systems, automated business transactions, and e-commerce applications that need the installation of complex and rigorous security measures. Public key cryptography is a security technology that is known for the support of security mechanisms like confidentiality, integrity, non-repudiation, and authentication. For the Software Company to achieve this security assurance there must be careful planning for the infrastructure.

A public key infrastructure (PKI) is a foundation whereby other applications, systems and components of security are built. A PKI is a foundation where it acts as an overall security whereby all the other components and features must work. This paper will not look into the underlying structure of cryptography. PKI is a very wide cryptographic technique. This paper will offer the real opportunities that can be adopted, by the Software Company, to remove their fears, and misconceptions on the use of this technology.

In addition to this, paper will also look into the rationale as to why this technology is suitable for various business applications. There are components which are available in a PKI framework. These components include operational policies, security services, and interoperability protocols which are all geared to support the use of public-key cryptography. The generation and management of public keys occurs through the use of Certificate Authorities (CAs), Registration Authorities (RAs) and directory services which can be used to establish a list of trust.

At the national level, the use of PKI can be very instrumental when dealing with security. One of the principles of PKI is to establish a trust hierarchy (U.S General Services Administration Government Smart Card handbook, 2004). In e-commerce, when dealing with trust mechanisms, there must be the provision of management control. There must be a management control at the Ministry of Information. In the e-commerce environment, entities, which are not known to each other, do not have enough trust that has been established to perform business, contractual, legal, or other types of transactions.

For this trust to be achieved, the implementation of PKI should be done by using CA. In summary, the working of CA is as follows. For entities which are unknown to each other, they will each establish a trust relationship with a CA. The CA will perform some form of entity authentication according to the rules that have been established as has been noted by the Certificate Practices Statement (CPS). After this process, each entity is then issued with a digital certificate. The beauty of this is the fact that the certificate is signed by CA and thus the identity of the entities is vouched (Stalling, 1999).

With this, individuals who are unknown to each other can then establish trust between them because they have trust with the CA that it has performed some form of authentication on both of the entities. What is more, the signing of the CA is an attestation to this fact. One of the benefits of PKI is the establishment of a trust hierarchy which works well with networks which are of different environments and platforms. Positive features of in-house CAWith the use of in-house CAs, there is easy management of the certificates.

With this aspect, there is no need to have third parties to manage the certificates that have been created. With the Windows Server Active Directory that is present in the company, it is easy to manage the certificates as the CA can be integrated into the active directory of the server. In addition to this, there is no addition of costs when one is managing a certificate internally. They are also simpler when they are being configured as when compared to public keys (General Accounting Office (USA), 2004).

Negative featuresWith the use of in-house CA, the security and accountability of PKI rests with the organization that is hosting the PKI. If an organization goes for the option of in-house CA, the external parties will not sign any contract with organizations which have signed internal CAs. The management overhead of a certificate that is signed internally is higher than that of an eternal certificate (Kapilia, 2003). Advantages of public CAWith the use of a public CA, the external third parties are responsible for the infrastructure of PKI in the company.

Other parties who work with the company have confidence with certificate authorities, which have been signed by third parties like VeriZon. The management overhead of an external certificate is lower when compared to the in-house certificate. Disadvantage of public CAThe integration of the certificate with the internal security infrastructure becomes hard as there are limitations. There is also a need to pay the certificates that will be used by the organization. This will be expensive for the organization.

The expanding and the flexibility of the certificates will be limited. Recommendation I would recommend in-house certificate for the organization. This is because it will be managed well with the windows active directory. In e-commerce, when dealing with trust mechanisms, there must be the provision of management control (General Accounting Office (USA), 2001). There must be a management control at the Ministry of Information. In the e-commerce environment, entities which are not known to each other, do not have enough trust to perform business, contractual, legal, or other types of transactions.

For this trust to be achieved, the implementation of PKI should be done by using CA. In summary, the working of CA is as follows. For entities which are unknown to each other, they will each establish a trust relationship with a CA. The CA will perform some form of entity authentication according to the rules that have been established as has been noted by the Certificate Practices Statement (CPS). After this process, each entity is then issued with a digital certificate. The beauty of this is the fact that the certificate is signed by a CA and thus the identity of the entities is vouched.

With this, individuals who are unknown to each other can then establish trust between them because they have trust with the CA that it has performed some form of authentication on both of the entities. What is more, the signing of the CA is an attestation to this fact. One of the benefits of PKI is the establishment of a trust hierarchy which works well with networks which are of different environments and platforms (Stalling, 1999). References General Accounting Office (USA) (2001). Advances and remaining challenges to adoption of PKI technology.

New York: Cengage Learning.General Accounting Office (USA) (2004). Authentication handbook for federal and government agencies. New York: Cengage Learning.Kapilia, R. (2003). PKI security solutions for the enterprise, Wiley Publishing Inc.Stalling, W. (1999). Cryptography and network security, principles and practice. New York: Prince Hall.

Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Week 6 Case Study 2 Submission Assignment Example | Topics and Well Written Essays - 500 words”, n.d.)
Week 6 Case Study 2 Submission Assignment Example | Topics and Well Written Essays - 500 words. Retrieved from https://studentshare.org/information-technology/1608187-week-6-case-study-2-submission
(Week 6 Case Study 2 Submission Assignment Example | Topics and Well Written Essays - 500 Words)
Week 6 Case Study 2 Submission Assignment Example | Topics and Well Written Essays - 500 Words. https://studentshare.org/information-technology/1608187-week-6-case-study-2-submission.
“Week 6 Case Study 2 Submission Assignment Example | Topics and Well Written Essays - 500 Words”, n.d. https://studentshare.org/information-technology/1608187-week-6-case-study-2-submission.
  • Cited: 0 times

CHECK THESE SAMPLES OF Week 6 Case Study 2 Submission

Gateway Project for Snowtown

The city of Snowtown is literally an invisible dot on the wider plain of the Australian map largely due to some conspicuous architectural oversights.... A visible lapse in the city is the absence of gateways that serves the purpose of explicitly publicizing the district to motorist and travelers....
10 Pages (2500 words) Case Study

The Current Economic Situation in Australia

Since the Australian dollar was week against the U.... The paper "The Current Economic Situation in Australia" states that the reduction of rates of Australia's major trading partner may have caused the rates to be reduced as well.... Given all this evidence provided in the study, the rates of the RBA are expected to remain low....
8 Pages (2000 words) Case Study

Scotland Planning Law

From the paper "Scotland Planning Law" it is clear that environmental justice requires the public and the government to realise the swelling impact of environmental mismanagement.... nbsp;It also means not making unrealistic burdens on the environment to absorb waste and pollution.... hellip; The Århus Convention established the rights of the public with regard to the environment....
11 Pages (2750 words) Case Study

Ante-bellum America and Issues of Class and Reproduction

The paper "Ante-bellum America and Issues of Class and Reproduction" states that the remaining women of the South lost control over their lives through the backbreaking work of keeping their families cared for and the legislative power of men over the bodies of their wives.... hellip; The North had its own contrast in the hundreds of women who went to work in the factories of the cities for a fraction of what men earned....
9 Pages (2250 words) Case Study

Contingency Response plan for Yacht Company Onshore

This paper contains the detailed onshore contingency response plan for AURORA HOLIDAYS, the luxury yacht service company.... The purpose of the contingency response plan is to ascribe responsibilities to personnel working ashore for the purpose of responding to various emergencies.... hellip; Immediately, on receiving the report, each incident is to be evaluated on the basis of the gravity of the situation....
13 Pages (3250 words) Case Study

Needle and Syringe Services Assessment

… The paper "Provide Needle and Syringe Services Assessment" is a perfect example of a case study on medical science.... nbsp;A Needle and Syringe Programme, which is also known as Syringe-Exchange Programme is a social policy hinged on the idea of reduction of harm where users of drugs can get hypodermic needles and the necessary equipment for injection at low or no cost....
6 Pages (1500 words) Case Study

The Concept of Community Cohesion

… The paper "The Concept of Community Cohesion" is a good example of a case study on sociology.... The concept of community has been in discourses in diverse realms of academia in the past decades.... This has culminated in extensive definitions of this concept by different proponents.... Some of these proponents distinguished between two major utilities of this concept....
8 Pages (2000 words) Case Study

Terror Attack within Australia

The paper "Terror Attack within Australia" will find out the risk of terrorism in Australia, which has become a major concern for the government and other stakeholders.... The study will be based on the risk that has been received by government intelligence and terror attack attempts within Australia....
6 Pages (1500 words) Case Study
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us