Saturday, June 15, 2019

Week 6 Case Study 2 Submission Assignment Example | Topics and Well Written Essays - 500 words

Week 6 Case Study 2 Submission - Assignment ExampleA PKI is a foundation where it acts as an boilersuit security whereby all the other components and features must work. This radical will not look into the underlying structure of cryptography. PKI is a very wide cryptographic technique. This paper will offer the real opportunities that can be adopted, by the Software Company, to remove their fears, and misconceptions on the use of this technology. In addition to this, paper will in like manner look into the rationale as to why this technology is suitable for various business applications.There are components which are available in a PKI framework. These components accept operational policies, security services, and interoperability protocols which are all geared to support the use of public-key cryptography. The generation and management of public keys occurs through the use of Certificate Authorities (CAs), fitting Authorities (RAs) and directory services which can be used to es tablish a list of swan. At the national level, the use of PKI can be very instrumental when dealing with security. One of the principles of PKI is to establish a reliance hierarchy (U.S General Services Administration Government Smart Card handbook, 2004). In e-commerce, when dealing with trust mechanisms, there must be the provision of management control. There must be a management control at the Ministry of Information. In the e-commerce environment, entities, which are not known to each other, do not have enough trust that has been established to perform business, contractual, legal, or other types of transactions. For this trust to be achieved, the implementation of PKI should be done by using CA.In summary, the working of CA is as follows. For entities which are unknown to each other, they will each establish a trust relationship with a CA. The CA will perform some form of entity authentication according to the rules that have been established as has been noted by the

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.