Your Perfect Assignment is Just a Click Away

We Write Custom Academic Papers

100% Original, Plagiarism Free, Customized to your instructions!

glass
pen
clip
papers
heaphones

IT484 Cybersecurity Policies

IT484 Cybersecurity Policies

Unit 7-1 Assignment

Your Name

Purdue University Global

IT484 Cybersecurity Policies

Associate Professor David Lecomte

May 7, 2020

Part 1: Using the Internet and/or the Library

Research and explain your answer to the following: Explain how Active Directory implements PKI. Be sure to detail the use of certificates, the use of keys, and key security.

Replace these words with 500 to 1,000 words. Then remove italics and change the color to black. See CHAPTER 7 OF YOUR COURSE TEXTBOOK for guidance here. SOME THOUGHTS: First discuss what Active Directory is. Centralized database [explain] …. Directory of objects [explain] organizational units … containers … forests, trees, leaves … groups … global policies … users, resources … access control … Novell Netware.

Discuss what is PKI? Form of access control … uses certificates … uses asymmetric cryptography … authenticates users … provides CIA & nonrepudiation. Explain keys… key security …key distribution.

SOME RESOURCES: https://techterms.com/definition/active_directory

https://www.techopedia.com/definition/25/active-directory

https://www.pkisolutions.com/understanding-active-directory-certificate-services-containers-in-active-directory/

What Is PKI? A Crash Course on Public Key Infrastructure (PKI)

https://www.entrustdatacard.com/pages/what-is-pki

Part 2: Research and Explain the Following

1) Give an example of a protocol that uses both public key and private key cryptography and explain how and why it does so.

Replace these words with 200 words. Then remove italics and change the color to black. I believe that CHAPTER 7 OF YOUR COURSE TEXTBOOK for guidance here. SOME THOUGHTS: Explain how each of these are a part of public and private key cryptography: SMTPS, S/MIME, SSH, SFTP, SSL, TLS/SSL…Kerberos, PGP, HTTPS, IPSec,

2) How are the public key and private key of an asymmetrical key set related? What about this relationship makes it a “one-way” process?

SOME THOUGHTS: Replace these words with 200 words. Then remove italics and change the color to black. Explain that there is a mathematical relationship between the two keys that is such that only the specific key that decrypts can decrypt a particular encryption. Explain what the process is and how it can only one way.

References

Murphy, B. (2015). SSCP (ISC)2 Systems security certified practitioner official study guide, (1st, Ed.). [VitalSource Bookshelf Online]. Retrieved from https://purdueuniversityglobal. vitalsource.com/#/books/9781119059684/cfi/0!/4/2@100:0.00

NOTE: DELETE this line and ALL underlined text before submitting your Assignment.

Assignment 7 Grading Rubric = 45 points

Assignment Requirements

Points

Possible

Points

Earned

Part 1

Explain how Active Directory implements PKI. Be sure to detail the use of certificates, the use of keys, and key security (500-1000 words)

0–30

Part 2

Give an example of a protocol that uses both public key and private key cryptography and explain how and why it does so. (200 or more words)

0–5

How are the public key and private key of an asymmetrical key set related? What about this relationship makes it a “one-way” process? (200 or more words)

0–5

Column Total

0–45

Less deduction taken for spelling, grammar, and APA errors. Plagiarism is totally unacceptable.

New total after deductions

Order Solution Now

Our Service Charter

1. Professional & Expert Writers: Blackboard Experts only hires the best. Our writers are specially selected and recruited, after which they undergo further training to perfect their skills for specialization purposes. Moreover, our writers are holders of masters and Ph.D. degrees. They have impressive academic records, besides being native English speakers.

2. Top Quality Papers: Our customers are always guaranteed of papers that exceed their expectations. All our writers have +5 years of experience. This implies that all papers are written by individuals who are experts in their fields. In addition, the quality team reviews all the papers before sending them to the customers.

3. Plagiarism-Free Papers: All papers provided by Blackboard Experts are written from scratch. Appropriate referencing and citation of key information are followed. Plagiarism checkers are used by the Quality assurance team and our editors just to double-check that there are no instances of plagiarism.

4. Timely Delivery: Time wasted is equivalent to a failed dedication and commitment. Blackboard Experts is known for timely delivery of any pending customer orders. Customers are well informed of the progress of their papers to ensure they keep track of what the writer is providing before the final draft is sent for grading.

5. Affordable Prices: Our prices are fairly structured to fit in all groups. Any customer willing to place their assignments with us can do so at very affordable prices. In addition, our customers enjoy regular discounts and bonuses.

6. 24/7 Customer Support: At Blackboard Experts, we have put in place a team of experts who answer to all customer inquiries promptly. The best part is the ever-availability of the team. Customers can make inquiries anytime.