StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...

Computing security exam question - Essay Example

Cite this document
Summary
Public Key Infrastructure (PKI) refers to an array of electronic devices, applications, guidelines, and methods that play a crucial role in the organization and management of digital certificates. Advanced business structures, online trade, and streamlined business operations…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER95.7% of users find it useful
Computing security exam question
Read Text Preview

Extract of sample "Computing security exam question"

Download file to see previous pages

PKI provides a powerful and robust environment to ensure security of consumer interests, transactions, and information. Stephen Wilson states that “It is well known that PKI’s successes have mostly been in closed schemes”. This paper will seek to assess and analyze the effectiveness of Public Key Infrastructure (PKI). Public Key Infrastructure (PKI) is a schema that provides high level of security and confidentiality for Internet users that seek to engage in online transactions and e-commerce.

It enables information and monetary transactions to be conducted in a safe and secure manner. A digital certificate is issued in order to recognize individuals and organizations. PKI utilizes public and private keys over the Internet in order to ensure high levels of authentication and privacy. The Internet presents valuable business opportunities for individuals and organization, but it also causes safety and veracity problems (Carlisle, 1999). PKI helps to provide supplementary levels of safety and veracity for online business transactions and e-commerce.

The rapid growth of the Internet pushed the need for high levels of trust, confidentiality, and security. Several companies began to design security algorithms and protocols in order to ensure safe and secure transactions. Netscape designed the SSL protocol which allowed the use of digital certificates and security algorithms for safe business transactions over the Internet. PKI was dubbed to the ultimate security protocol and mechanism in the 1990s. A number of vendors began to operate in the environment seeking to create standards and procedures.

However the hype over PKI was over by the start of the twenty first century as vendors began to register technical and operational problems over its implementation. The rapid proliferation of the Internet during the 1990s also raised concern about conviction and

...Download file to see next pages Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Computing security exam question Essay Example | Topics and Well Written Essays - 1000 words”, n.d.)
Computing security exam question Essay Example | Topics and Well Written Essays - 1000 words. Retrieved from https://studentshare.org/miscellaneous/1561567-computing-security-exam-question
(Computing Security Exam Question Essay Example | Topics and Well Written Essays - 1000 Words)
Computing Security Exam Question Essay Example | Topics and Well Written Essays - 1000 Words. https://studentshare.org/miscellaneous/1561567-computing-security-exam-question.
“Computing Security Exam Question Essay Example | Topics and Well Written Essays - 1000 Words”, n.d. https://studentshare.org/miscellaneous/1561567-computing-security-exam-question.
  • Cited: 0 times

CHECK THESE SAMPLES OF Computing security exam question

Computerization of the Process for Preparing Question Papers

The School of Technology at Oxford Brookes University is undertaking the computerization of the process for preparing question papers for its various departments.... The new system, which shall be named “School of Technology Modular Examination and Coursework Preparation” (STMECP System), must address the issues associated with the current system while meeting quality assurance requirements in the preparation of question papers.... The process involves communication between the Examination and Conferment Unit (ECU), module leaders, teaching staff, internal checkers, the exam secretary, and external examiners....
14 Pages (3500 words) Essay

MIS FINAL EXAM MULTIPLE CHOICE QUESTIONS

If you created links on your personal Web site that connected your visitors to businesses with the goal that you would earn a fee for purchases made by your visitors, what type e-commerce model are you creating? If you were trying to access your campus network but the system… Which scrambling technique provides you with two keys: a public key that everyone in an organization can have to scramble the If you wanted your children to play games with others who had the same gaming device but you wanted to ensure that people outside their play area could not tap into the game, what wireless device would you need?...
4 Pages (1000 words) Essay

Homeland Security and Critical Thinking

nbsp; “The US Homeland security”, Peters submits, “consists of all military activities aimed at preparing for, protecting against or managing the consequences of attacks on American soil, including the CONUS and US territories and possessions.... rdquo; (2000: 2) Hence, homeland security consists of the planning and preparations made at both military and civilian levels to make foolproof arrangements for foiling the external and internal threats challenging the peace and stability of the country....
8 Pages (2000 words) Assignment

Management and Implementation of Secure Information Systems

The TCB is characterized by vulnerabilities and bugs that do not jeopardize the security of the entire operating system.... The security of any system depends on key length and the computational work engaged in breaking the cipher.... The implementation of a “covert channel” is a popular technique for subverting security safeguards.... hellip; A trusted computing base (TCB) is a component of a computer system characterized by a set of firmware, hardware, and software elements that serve an important purpose in protecting the computer system....
9 Pages (2250 words) Assignment

Sample Exam Solution in IT and Ethics

This work "Sample exam Solution in IT and Ethics" describes a few questions about IT technologies.... ne thing that differs for IT professionals, though, is the amount and multiplicity of codes of conduct that the IT professional may pass on to in their attempt to achieve the best ethical business solution in any morally ambiguous business computing situation....
13 Pages (3250 words) Assignment

Alcohol Use in Teens

All the mentioned outcomes of alcohol and drug use indicate destructive consequences for the teens, their academic careers, social security and financial stability.... From the paper "Alcohol Use in Teens" it is clear that generally speaking, in the United States, the legal age to consume alcohol is 21 due to which, all the teens who are involved in drinking alcohol are involved in illegal activity (TeensHealth, 2006)....
8 Pages (2000 words) Research Proposal

Virtualize Desktop Infrastructure in the Work Environment

This review ''Virtualize Desktop Infrastructure in the Work Environment'' is about the Virtual desktop infrastructure (VDI) as the technology where a virtual machine is used to run a desktop operating system.... nbsp;Some of the famous companies that have already adapted the technology include Microsoft, Caterpillar, Toshiba among others....
6 Pages (1500 words) Literature review

Opportunities and Pitfalls of Cloud Computing

Cloud computing shares the distributed resources through the network in an environment that is open thus posing security challenges and hence its effectiveness.... The paper "Opportunities and Pitfalls of Cloud computing" presents that although the concept of cloud computing can be traced back to the 1950s, its vitality in providing the access to digital content has over the recent past become evident over the last ten years.... hellip; After a discussion of the de-merits, merits, opportunities, and ethical challenges that are brought about by cloud computing, there is no clear answer against or in favor of cloud computing....
10 Pages (2500 words) Term Paper
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us