A Public Key Infrastructure is not a single device or entity; it is a compilation of technology, infrastructure, and practices that enables large scale use of public key cryptography to provide authenticity, confidentiality, integrity, and non-repudiation services (CITE). The word cryptography is derived from the Greek word “kryptos”(CITE), which means hidden. It is the technique in which a cryptographic algorithm is used to take the original plaintext information and then make it unreadable to everyone except for those it was initially intended for by scrambling it into ciphertext. This is known as encryption, and the process that unscrambles the message to make it readable again is called decryption. The National Security Agency (NSA) even defines cryptography as the science and art of making codes and ciphers(CITE NSA 2009). In cryptography, a key or code is used to scramble the message which results in a cipher.
Cryptography has not alw...
... middle of paper ...
...rce. (2007, Sept 18). Public Key Infrastructures - Federal PKI. Retrieved Sept 15, 2009, from NIST-Computer Security Division: http://csrc.nist.gov/groups/ST/crypto_apps_infra/pki/index.html
NIST. (2009). Federal Information Processing Standard (FIPS) Publication 186-3, Digital Signature Standard (DSS). Washington, D.C.: Department of Commerce.
NSA. (2009, 01 12). Frequently Asked Questions Terms and Acronyms - NSA/CSS:. Retrieved 10 11, 2009, from National Security Agency: http://www.nsa.gov/about/faqs/terms_acronyms.shtml
US-CERT. (2008, 12 31). Vulnerability Note VU#836068. Retrieved 10 12, 2009, from US-CERT: http://www.kb.cert.org/vuls/id/836068
VeriSign, Inc. (2009). National PKI: The foundation of trust in government programs (A White Paper). Retrieved Sept 15, 2009, from VeriSign White Paper: http://www.verisign.com/static/national-pki-government-trust.pdf
Need Writing Help?
Get feedback on grammar, clarity, concision and logic instantly.Check your paper »
- Institutions of higher learning are increasingly using Information and Communication systems in administration, teaching, learning and research. This infrastructure needs to be available, secure and well protected. It therefore becomes crucial for information security practitioners in public universities to implement effective information security programs. Information security focuses on technological issues and important elements of an organization such as people, process, business strategies etc., which also mandates the need for information security.... [tags: Information security, Security, Computer security]
1097 words (3.1 pages)
- The famous cryptographer Bruce Schneier once said that “[p]eople often represent the weakest link in the security chain and are chronically responsible for the failure of security systems” (Schneier, 2000). The practice of Information Security Management is employed by businesses through a variety of standards, best practices, and frameworks to combat this issue. Their adoption of best practices in the public domain allows businesses to strive for improvements through their own interpretation. These best practices are sourced from standards such as ISO/IEC 27000, proprietary knowledge and public frameworks such as COBIT, Six Sigma, or ITIL.... [tags: Information security, Security]
1160 words (3.3 pages)
- A. DESCRIPTION OF THE PROPOSED SOLUTION 1. International Maritime PKI description The foundation of our proposal is the development of an International Maritime Public Key Infrastructure that should act as the coordinator of the infrastructure and may be functionally under International Maritime Organization. On the other hand each maritime country should develop its own public key infrastructure that should satisfy a minimum number of the International Maritime PKI standards in order to be compatible.... [tags: authority, authentication, infrastructure]
1522 words (4.3 pages)
- Introduction As the African proverb denotes, “It takes a village to raise a child”, it will take that same communal effort in today’s society to keep that child safe in school and higher education facilities. This village must consist of parents, law enforcement, federal government, personnel, and the general public for protection. As preponderant challenges emerges in this wicked society related to public mass shootings, higher education institutions are placing more accentuation than ever upon risk mitigation.... [tags: Information security, Security, Computer security]
1483 words (4.2 pages)
- Cyber security is defined as the protection of information on computer systems and the protection of the hardware that supports or stores the information on computers or servers. This level of protection can include controlling physical access to the hardware, as well as protecting against harm that may come from local or remote network access, data and code injection and due to malpractice by system operators, who may have been tricked by outside personnel to place the system in a compromising situation.... [tags: Computer security, Information security, Computer]
833 words (2.4 pages)
- The private security and law enforcement officer as well the FBI function and responsibilities have tightened after the 9/11 attacked. Private security officers are undergoing more advanced training from latest technology system to protect the nation to terrorism to be prepared and ready in any event that might come along the way like the 9/11 attacked. After the disastrous event of the 9/11 attack numerous companies and group of people obligate themselves a thorough investigation and evaluation.... [tags: National Security ]
936 words (2.7 pages)
- CRITICAL INFRASTRUCTURE - INFORMATION TECHNOLOGY Executive Summary: The Information Technology Sector in the United States is an extremely complex environment supporting and interdependent between all 16 sectors. According to the department of Homeland Security, “These virtual and distributed functions produce and provide hardware, software, IT systems and services, and in collaboration with the Communications Sector the Internet” (DHS, 2014). Problem Statement: In the United States, the Information Technology Sector has showed increased reliance on computer systems, which they have linked to almost all their vital infrastructures.... [tags: National security, Security]
1438 words (4.1 pages)
- Purpose Pathways Corporation office locations that include computers and other types of information technology resources must be safeguarded against unlawful and unauthorized physical intrusion, as well as fire, flood and other physical threats. This includes but is not limited to: external doors that are locked from closing until opening of the building, locked and/or barred windows, security cameras, controlled access areas, registration of visitors at entrances, security guards, and fire protection.... [tags: Computer security, Security, Security guard]
1096 words (3.1 pages)
- The information security challenges faced in Zanzibar are persistent in transitional countries as could be seen in the case study “state of Information Security in Zanzibar’s public sector” (Shaaban, et al., 2012). Most of these challenges are partly attributed to lack of proper budgeting for ICT infrastructures, cultural gap awareness, political instability, trust, business continuity plan, and inadequate human resource management to effectively manage this technology (Dada, 2006). The application of e-government in corporate governance to improve efficiency and effectiveness of the public sector agencies and delivery of services to the users has increased extensively, due to its result ori... [tags: Security Challenges, Transitional Countries]
1456 words (4.2 pages)
- Introduction The first thing that we must consider about Information Security is that there is not a final destination at which we can arrive. IT Security is an ongoing set of processes and activities that requires attention and expertise on a daily basis. It is important to understand that systems are not secured by themselves and it is our responsibility to maintain and improve them periodically as required. It is of vital importance to establish the appropriate mechanisms and requirements in order to support the company’s CIA triad.... [tags: IT Security]
2693 words (7.7 pages)