Information Systems homework help

Responsive Centered Red Button

Need Help with this Question or something similar to this? We got you! Just fill out the order form (follow the link below), and your paper will be assigned to an expert to help you ASAP.

 
 
 
 
 
Unit 7-1 Assignment
 
 
 
 
 
 
 
 
 
 
 
 
 
 
Part 1: Using the Internet and/or the Library
Research and explain your answer to the following: Explain how Active Directory implements PKI. Be sure to detail the use of certificates, the use of keys, and key security. 
Replace these words with 500 to 1,000 words. Then remove italics and change the color to black. See CHAPTER 7 OF YOUR COURSE TEXTBOOK for guidance here. SOME THOUGHTS: First discuss what Active Directory is. Centralized database [explain] …. Directory of objects [explain] organizational units … containers … forests, trees, leaves … groups … global policies … users, resources … access control … Novell Netware.
Discuss what is PKI? Form of access control … uses certificates … uses asymmetric  cryptography … authenticates users … provides CIA & nonrepudiation. Explain keys… key security …key distribution.
SOME RESOURCES: https://techterms.com/definition/active_directory
https://www.techopedia.com/definition/25/active-directory

Understanding Active Directory Certificate Services containers in Active Directory

What Is PKI? A Crash Course on Public Key Infrastructure (PKI)


https://www.entrustdatacard.com/pages/what-is-pki

 
Part 2: Research and Explain the Following

Give an example of a protocol that uses both public key and private key cryptography and explain how and why it does so.

Replace these words with 200 words. Then remove italics and change the color to black. I believe that CHAPTER 7 OF YOUR COURSE TEXTBOOK for guidance here. SOME THOUGHTS: Explain how each of these are a part of public and private key cryptography: SMTPS, S/MIME, SSH, SFTP, SSL, TLS/SSL…Kerberos, PGP, HTTPS, IPSec,

How are the public key and private key of an asymmetrical key set related? What about this relationship makes it a “one-way” process? 

SOME THOUGHTS: Replace these words with 200 words. Then remove italics and change the color to black. Explain that there is a mathematical relationship between the two keys that is such that only the specific key that decrypts can decrypt a particular encryption. Explain what the process is and how it can only one way.
 
 
References
 
Murphy, B. (2015). SSCP (ISC)2 Systems security certified practitioner official study guide, (1st, Ed.). [VitalSource Bookshelf Online]. Retrieved from https://purdueuniversityglobal. vitalsource.com/#/books/9781119059684/cfi/0!/4/2@100:0.00
 
 
NOTE: DELETE this line and ALL underlined text before submitting your Assignment.
 
Assignment  7 Grading Rubric = 45 points
 

Assignment Requirements
Points
Possible
Points
Earned

Part 1
 
 

Explain how Active Directory implements PKI. Be sure to detail the use of certificates, the use of keys, and key security (500-1000 words)
0­­­­–30
 

Part 2
 
 

Give an example of a protocol that uses both public key and private key cryptography and explain how and why it does so. (200 or more words)
0–5
 

How are the public key and private key of an asymmetrical key set related? What about this relationship makes it a “one-way” process? (200 or more words)
0–5
 

Column Total
0–45
 

Less deduction taken for spelling, grammar, and APA errors. Plagiarism is totally unacceptable.
 
 

New total after deductions
 
 

 
 
 

How to create Testimonial Carousel using Bootstrap5

Clients' Reviews about Our Services