Monday, August 26, 2019
Week 6 Case Study 2 Submission Assignment Example | Topics and Well Written Essays - 500 words
Week 6 Case Study 2 Submission - Assignment Example A PKI is a foundation where it acts as an overall security whereby all the other components and features must work. This paper will not look into the underlying structure of cryptography. PKI is a very wide cryptographic technique. This paper will offer the real opportunities that can be adopted, by the Software Company, to remove their fears, and misconceptions on the use of this technology. In addition to this, paper will also look into the rationale as to why this technology is suitable for various business applications. There are components which are available in a PKI framework. These components include operational policies, security services, and interoperability protocols which are all geared to support the use of public-key cryptography. The generation and management of public keys occurs through the use of Certificate Authorities (CAs), Registration Authorities (RAs) and directory services which can be used to establish a list of trust. At the national level, the use of PKI can be very instrumental when dealing with security. One of the principles of PKI is to establish a trust hierarchy (U.S General Services Administration Government Smart Card handbook, 2004). In e-commerce, when dealing with trust mechanisms, there must be the provision of management control. There must be a management control at the Ministry of Information. In the e-commerce environment, entities, which are not known to each other, do not have enough trust that has been established to perform business, contractual, legal, or other types of transactions. For this trust to be achieved, the implementation of PKI should be done by using CA. In summary, the working of CA is as follows. For entities which are unknown to each other, they will each establish a trust relationship with a CA. The CA will perform some form of entity authentication according to the rules that have been established as has been noted by the
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.