Strayer Case Study 2: Public Key Infrastructure CIS 333

CIS 333 Networking Security Fundamentals, Strayer, Case Study 2 Public Key Infrastructure, 5 pages, 950 words, Identify and analyze the fundamentals of PKI. Analyze positive and negative characteristics of a Public and In-house CA. Provide a sound recommendation for either a Public CA or an In-house CA.
You are the Information Security Officer at a small software company. The organization currently utilizes a Microsoft Server 2008 Active Directory domain administered by a limited number of over-tasked network administrators. The remainder of the organization comprises mostly software developers and a relatively small number of administrative personnel. The organization has decided that it would be in its best interest to use a public key infrastructure (PKI) to provide a framework that fosters confidentiality, integrity, authentication, and nonrepudiation. Email clients, virtual private network products, Web server components, and domain controllers would utilize digital certificates issued by the certificate authority (CA). Additionally, digital certificates would be used to sign software developed by the company to demonstrate software authenticity to the customer.

Download Now
(sent via email)

Leave a Reply