Friday, February 15, 2019
Information Security: Public Key Infrastructure Essay -- Information
With the increase of digital communications and transactions, a stronger level of surety is required to protect the user and their data transactions. Systems, servers, personal computers, mobile devices, tokens and chicness cards are all being used ubiquitously to view saved communications. With the influx of data management, there is an ever-apparent contest between the two adversaries in the game of Information earnest the developers and the hackers. PKI was designed to leverage the Internet bag for communications (CITE Samuelle 2009). While minimizing hostile exploitation of data, decreasing data theft, and providing an redundant layer of trust through keys pairs and digital certificates, PKI is used to verify the individuality of the user and the authenticity of the data. A Public Key Infrastructure is non a single device or entity it is a compilation of technology, infrastructure, and practices that enables puffy scale use of public key cryptography to provide authentici ty, confidentiality, integrity, and non-repudiation function (CITE). The word cryptography is derived from the Greek word kryptos(CITE), which means hidden. It is the technique in which a cryptographic algorithm is used to take the original plaintext schooling and then make it unreadable to everyone except for those it was initially intended for by scrambling it into ciphertext. This is known as encryption, and the process that unscrambles the message to make it readable over again is called decryption. The field Security Agency (NSA) even defines cryptography as the erudition and art of making inscribes and ciphers(CITE NSA 2009). In cryptography, a key or code is used to scramble the message which results in a cipher.Cryptography has not alw... ...rce. (2007, Sept 18). Public Key Infrastructures - Federal PKI. Retrieved Sept 15, 2009, from NIST-Computer Security sectionalisation http//csrc.nist.gov/groups/ST/crypto_apps_infra/pki/index.htmlNIST. (2009). Federal Informat ion Processing Standard (FIPS) Publication 186-3, Digital touch modality Standard (DSS). Washington, D.C. Department of Commerce.NSA. (2009, 01 12). Frequently Asked Questions Terms and Acronyms - NSA/CSS. Retrieved 10 11, 2009, from National Security Agency http//www.nsa.gov/about/faqs/terms_acronyms.shtmlUS-CERT. (2008, 12 31). Vulnerability Note VU836068. Retrieved 10 12, 2009, from US-CERT http//www.kb.cert.org/vuls/id/836068VeriSign, Inc. (2009). National PKI The foundation of trust in government programs (A sportsmanlike Paper). Retrieved Sept 15, 2009, from VeriSign White Paper http//www.verisign.com/static/national-pki-government-trust.pdf
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment