Unit 7-1 Assignment
Your Name
Purdue University Global
IT484 Cybersecurity Policies
Associate Professor David Lecomte
May 7, 2020
Part 1: Using the Internet and/or the Library
Research and explain your answer to the following: Explain how Active Directory implements PKI. Be sure to detail the use of certificates, the use of keys, and key security.
Replace these words with 500 to 1,000 words. Then remove italics and change the color to black. See CHAPTER 7 OF YOUR COURSE TEXTBOOK for guidance here. SOME THOUGHTS: First discuss what Active Directory is. Centralized database [explain] . Directory of objects [explain] organizational units containers forests, trees, leaves groups global policies users, resources access control Novell Netware.
Discuss what is PKI? Form of access control uses certificates uses asymmetric cryptography authenticates users provides CIA & nonrepudiation. Explain keys key security key distribution.
SOME RESOURCES: https://techterms.com/definition/active_directory
https://www.techopedia.com/definition/25/active-directory
https://www.pkisolutions.com/understanding-active-directory-certificate-services-containers-in-active-directory/
https://www.entrustdatacard.com/pages/what-is-pki
Part 2: Research and Explain the Following
1) Give an example of a protocol that uses both public key and private key cryptography and explain how and why it does so.
Replace these words with 200 words. Then remove italics and change the color to black. I believe that CHAPTER 7 OF YOUR COURSE TEXTBOOK for guidance here. SOME THOUGHTS: Explain how each of these are a part of public and private key cryptography: SMTPS, S/MIME, SSH, SFTP, SSL, TLS/SSL Kerberos, PGP, HTTPS, IPSec,
2) How are the public key and private key of an asymmetrical key set related? What about this relationship makes it a one-way process?
SOME THOUGHTS: Replace these words with 200 words. Then remove italics and change the color to black. Explain that there is a mathematical relationship between the two keys that is such that only the specific key that decrypts can decrypt a particular encryption. Explain what the process is and how it can only one way.
References
Murphy, B. (2015). SSCP (ISC)2 Systems security certified practitioner official study guide, (1st, Ed.). [VitalSource Bookshelf Online]. Retrieved from https://purdueuniversityglobal. vitalsource.com/#/books/9781119059684/cfi/0!/4/2@100:0.00
NOTE: DELETE this line and ALL underlined text before submitting your Assignment.
Assignment 7 Grading Rubric = 45 points
Assignment Requirements
Points
Possible
Points
Earned
Part 1
Explain how Active Directory implements PKI. Be sure to detail the use of certificates, the use of keys, and key security (500-1000 words)
030
Part 2
Give an example of a protocol that uses both public key and private key cryptography and explain how and why it does so. (200 or more words)
05
How are the public key and private key of an asymmetrical key set related? What about this relationship makes it a one-way process? (200 or more words)
05
Column Total
045
Less deduction taken for spelling, grammar, and APA errors. Plagiarism is totally unacceptable.
New total after deductions
