Question

I: Answer the following questions. (1*6=6 pts) 1. What is Public key infrastructure (PKI)? 2. List...

I: Answer the following questions. (1*6=6 pts)

1. What is Public key infrastructure (PKI)?

2. List the four stages of a certificate life cycle.

3. List the three PKI trust models that use a CA.

4. What is the S/MIME protocol used for?

5. What is DDOS?

Homework Answers

Answer #1

1.Public key infrastructure (PKI)

A public key infrastructure (PKI) is a set of roles, policies, hardware, software and procedures needed to create, manage, distribute, use, store and revoke digital certificates and manage public-key encryption.

The purpose of a PKI is to facilitate the secure electronic transfer of information for a range of network activities such as e-commerce, internet banking and confidential email. It is required for activities where simple passwords are an inadequate authentication method and more rigorous proof is required to confirm the identity of the parties involved in the communication and to validate the information being transferred.

In cryptography, a PKI is an arrangement that binds public keys with respective identities of entities (like people and organizations). The binding is established through a process of registration and issuance of certificates at and by a certificate authority (CA). Depending on the assurance level of the binding, this may be carried out by an automated process or under human supervision.

The PKI role that may be delegated by a CA to assure valid and correct registration is called a registration authority (RA). Basically, an RA is responsible for accepting requests for digital certificates and authenticating the entity making the request.

2.The Four Stages of a Certificate Life Cycle

Digital certificates are electronic credentials that are used to authenticate the identities of individuals or devices using a particular network. It’s helpful to think of certificates with a similar functionality as a passport or driver’s license. While these official documents are issued and confirmed by governments to authenticate an identity, a digital certificate is issued and confirmed by a certificate authority (CA) to authenticate an identity .

Passwords rely on words or phrases created by the user, but certificates utilize public-private key encryption to encrypt information sent over-the-air and are authenticated with EAP-TLS, the most secure authentication protocol. Certificates offer far more advantages to IT departments and users alike, as they are easier to use and far more secure than credential based authentication.

However, even certificates are not valid forever.They go through a life cycle that is heavily influenced by an organization’s preferences. While there is some variation, generally speaking the four stages of a certificate are:

  1. Certificate Enrollment
  2. Certificate Distribution
  3. Certificate Validation
  4. Certificate Revocation

3.Three PKI trust models that use CA  

  1. Herarchical trust model
  2. Distributed trust model
  3. The bridge trust model

4. S/MIME protocol

  S/MIME (Secure/Multipurpose Internet Mail Extensions) is a widely accepted method (or more precisely, a protocol) for sending digitally signed and encrypted messages. S/MIME allows you to encrypt emails and digitally sign them.

When you use S/MIME with an email message, it helps the people who receive that message to be certain that what they see in their inbox is the exact message that started with the sender. It will also help people who receive messages to be certain that the message came from the specific sender and not from someone pretending to be the sender. To do this, S/MIME provides for cryptographic security services such as authentication, message integrity, and non-repudiation of origin (using digital signatures). It also helps enhance privacy and data security (using encryption) for electronic messaging. For a more complete background about the history and architecture of S/MIME in the context of email, see Understanding S/MIME.

5.DDOS

It is one of the least complicated attacks that a hacker can pull off. Basically the goal is to shut down a webserver or connection to the internet. Hackers accomplish this by flooding the server with an extremely large amount of traffic.

It would be like taking a wide open freeway and packing it full of the worst rush hour traffic you could imagine. Every connection to and from the freeway would grind to a halt. This would make visiting the website (or the road) next to impossible, or at the least extremely slow! In some cases, the server might overload and shut down completely.

When this happens, it doesn’t mean that the website was necessarily hacked. It just means that the website was kicked off the internet for a period of time. This may not sound like that big of a deal, but if your company relies heavily on its online presence, this interruption of service could take a huge cut out of profits.

Know the answer?
Your Answer:

Post as a guest

Your Name:

What's your source?

Earn Coins

Coins can be redeemed for fabulous gifts.

Not the answer you're looking for?
Ask your own homework help question
Similar Questions
Use the following key to answer the following questions. Each answer may be used once, more...
Use the following key to answer the following questions. Each answer may be used once, more than once, or not at all.             A.  The statement is true for mitosis only.             B.  The statement is true for meiosis I only.             C.  The statement is true for meiosis II only.             D.  The statement is true for mitosis and meiosis I.             E.  The statement is true for mitosis and meiosis II. 46.__  Sporophytic plant cells produce the 4 haploid spore cells. 47.__  Dyads are aligned on the equatorial plate of...
6) Write the Python Code which can answer the following questions (20 pts): a)Consider a program...
6) Write the Python Code which can answer the following questions (20 pts): a)Consider a program which contains a list of numbers from 1 to 10that are stored into a variable a. Create a program that will allow you to exchange the elements from variable a at position 0 and 7from within this list. b)Create a program that will access the last 5 elements of the variable a from step a.)
QUESTION 19 A key distribution and authentication method used by every operating system. It uses a...
QUESTION 19 A key distribution and authentication method used by every operating system. It uses a shared secret key and can also be used for single sign-on operations. 2 points    QUESTION 20 Authentication method that allows a user to authenticate once and use multiple services without having to re-authenticate. 2 points    QUESTION 21 Protocol that establishes the security association for the Authentication Header (AH) or the Encapsulating Security Payload (ESP) in IPsec, and provides keys for both AH...
5. [20 pts] For the function ?(?) = (4?−8)/(?^2−?−6) answer the following to sketch the graph....
5. [20 pts] For the function ?(?) = (4?−8)/(?^2−?−6) answer the following to sketch the graph. Do not use a graphing calculator. a. [2 pts] Determine the domain of the function, write your answer in interval notation: b. [4 pts] Find the x-intercept(s), if any. c. [2pts] Find the y-intercept, if any. d. [2 pts] Find the vertical asymptotes, if any. e. [2 pts] Find the horizontal asymptote(s) or slant asymptote, if any. f. [4 pts] Determine whether the graph...
Short Answer Questions 1. Explain trade barriers and list two kinds of trader barriers. 2. Is...
Short Answer Questions 1. Explain trade barriers and list two kinds of trader barriers. 2. Is trade today different from the past? Please list three points to support your opinion. 3. In your opinion, what's the impacts of globalization on international trade? 4. Some people say international trade is always bad while some other people believe that international trade is always good. Do you think their opinions are right or wrong? Please defense your answer with what you learned in...
Short Answer Questions 1. Explain trade barriers and list two kinds of trader barriers. 2. Is...
Short Answer Questions 1. Explain trade barriers and list two kinds of trader barriers. 2. Is trade today different from the past? Please list three points to support your opinion. 3. In your opinion, what's the impacts of globalization on international trade? 4. Some people say international trade is always bad while some other people believe that international trade is always good. Do you think their opinions are right or wrong? Please defense your answer with what you learned in...
please answer questions 1 to 6. 1. What is the difference between these two words: bryophyte...
please answer questions 1 to 6. 1. What is the difference between these two words: bryophyte and Bryophyta? 2. Recall the moss life cycle. Which has more DNA a gametophyte cell or a sporophyte cell? In one sentence, explain why. 3. In 3-4 sentences, explain how bryophytes and seedless vascular plants are used as energy sources today. 4..In 2-3 sentences, provide two reasons why pollen is an advantageous adaptation for survival on land. 5. Several pieces of evidence exist for...
Java question, Please answer everything. Thank you Answer the following questions as briefly (but completely) as...
Java question, Please answer everything. Thank you Answer the following questions as briefly (but completely) as possible: What is a checked exception, and what is an unchecked exception? What is NullPointerException? Which of the following statements (if any) will throw an exception? If no exception is thrown, what is the output? 1: System.out.println( 1 / 0 ); 2: System.out.println( 1.0 / 0 ); Point out the problem in the following code. Does the code throw any exceptions? 1: long value...
1. What are the key features of a typical project? 2. What is social complexity and...
1. What are the key features of a typical project? 2. What is social complexity and what is its role during project management? 3. How do you classify projects and why it makes sense to classify these in the first place? 4. What skills distinguish a project manager from a general manager? 5. What are the key goals in any project? How these relate to each other in the context of uncertainty? 6. What constitute a project's life cycle? why...
Use the following chart to answer the next two questions. 6/1 6/2 6/3 £.625/$ $1.50/£ £.72/$...
Use the following chart to answer the next two questions. 6/1 6/2 6/3 £.625/$ $1.50/£ £.72/$ ¥150/$ ¥150/$ ¥125/$ €1.25/$ €/$.80 $.90/€ How many euros would you receive for 100,000 pounds on 6/2? Round intermediate steps to four decimals and your final answer to two decimals.