Saturday, May 4, 2019
Week 6 Case Study 2 Submission Assignment Example | Topics and Well Written Essays - 500 words
Week 6 Case Study 2 subduedness - Assignment ExampleA PKI is a foundation where it acts as an overall security whereby all the former(a) components and features must work. This paper will not look into the underlying structure of cryptography. PKI is a very full(a) cryptographic technique. This paper will offer the real opportunities that fanny be adopted, by the Software Company, to hold their fears, and misconceptions on the use of this technology. In addition to this, paper will also look into the rationale as to why this technology is suitable for various business applications.There are components which are available in a PKI framework. These components include operational policies, security services, and interoperability protocols which are all geared to support the use of public-key cryptography. The propagation and management of public keys occurs through the use of Certificate Authorities (CAs), Registration Authorities (RAs) and directory services which can be used to p uddle a list of trust. At the national level, the use of PKI can be very instrumental when dealing with security. One of the principles of PKI is to establish a trust hierarchy (U.S General go Administration Government Smart Card handbook, 2004). In e-commerce, when dealing with trust mechanisms, there must be the provision of management control. There must be a management control at the Ministry of Information. In the e-commerce environment, entities, which are not known to each other, do not have enough trust that has been set up to perform business, contractual, legal, or other types of transactions. For this trust to be achieved, the implementation of PKI should be done by utilise CA.In summary, the working of CA is as follows. For entities which are unknown to each other, they will each establish a trust relationship with a CA. The CA will perform some form of entity earmark according to the rules that have been established as has been noted by the
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment