Question

I: Answer the following questions. (1*6=6 pts) 1. What is Public key infrastructure (PKI)? 2. List...

I: Answer the following questions. (1*6=6 pts)

1. What is Public key infrastructure (PKI)?

2. List the four stages of a certificate life cycle.

3. List the three PKI trust models that use a CA.

4. What is the S/MIME protocol used for?

5. What is DDOS?

Homework Answers

Answer #1

1.Public key infrastructure (PKI)

A public key infrastructure (PKI) is a set of roles, policies, hardware, software and procedures needed to create, manage, distribute, use, store and revoke digital certificates and manage public-key encryption.

The purpose of a PKI is to facilitate the secure electronic transfer of information for a range of network activities such as e-commerce, internet banking and confidential email. It is required for activities where simple passwords are an inadequate authentication method and more rigorous proof is required to confirm the identity of the parties involved in the communication and to validate the information being transferred.

In cryptography, a PKI is an arrangement that binds public keys with respective identities of entities (like people and organizations). The binding is established through a process of registration and issuance of certificates at and by a certificate authority (CA). Depending on the assurance level of the binding, this may be carried out by an automated process or under human supervision.

The PKI role that may be delegated by a CA to assure valid and correct registration is called a registration authority (RA). Basically, an RA is responsible for accepting requests for digital certificates and authenticating the entity making the request.

2.The Four Stages of a Certificate Life Cycle

Digital certificates are electronic credentials that are used to authenticate the identities of individuals or devices using a particular network. It’s helpful to think of certificates with a similar functionality as a passport or driver’s license. While these official documents are issued and confirmed by governments to authenticate an identity, a digital certificate is issued and confirmed by a certificate authority (CA) to authenticate an identity .

Passwords rely on words or phrases created by the user, but certificates utilize public-private key encryption to encrypt information sent over-the-air and are authenticated with EAP-TLS, the most secure authentication protocol. Certificates offer far more advantages to IT departments and users alike, as they are easier to use and far more secure than credential based authentication.

However, even certificates are not valid forever.They go through a life cycle that is heavily influenced by an organization’s preferences. While there is some variation, generally speaking the four stages of a certificate are:

  1. Certificate Enrollment
  2. Certificate Distribution
  3. Certificate Validation
  4. Certificate Revocation

3.Three PKI trust models that use CA  

  1. Herarchical trust model
  2. Distributed trust model
  3. The bridge trust model

4. S/MIME protocol

  S/MIME (Secure/Multipurpose Internet Mail Extensions) is a widely accepted method (or more precisely, a protocol) for sending digitally signed and encrypted messages. S/MIME allows you to encrypt emails and digitally sign them.

When you use S/MIME with an email message, it helps the people who receive that message to be certain that what they see in their inbox is the exact message that started with the sender. It will also help people who receive messages to be certain that the message came from the specific sender and not from someone pretending to be the sender. To do this, S/MIME provides for cryptographic security services such as authentication, message integrity, and non-repudiation of origin (using digital signatures). It also helps enhance privacy and data security (using encryption) for electronic messaging. For a more complete background about the history and architecture of S/MIME in the context of email, see Understanding S/MIME.

5.DDOS

It is one of the least complicated attacks that a hacker can pull off. Basically the goal is to shut down a webserver or connection to the internet. Hackers accomplish this by flooding the server with an extremely large amount of traffic.

It would be like taking a wide open freeway and packing it full of the worst rush hour traffic you could imagine. Every connection to and from the freeway would grind to a halt. This would make visiting the website (or the road) next to impossible, or at the least extremely slow! In some cases, the server might overload and shut down completely.

When this happens, it doesn’t mean that the website was necessarily hacked. It just means that the website was kicked off the internet for a period of time. This may not sound like that big of a deal, but if your company relies heavily on its online presence, this interruption of service could take a huge cut out of profits.

Know the answer?
Your Answer:

Post as a guest

Your Name:

What's your source?

Earn Coins

Coins can be redeemed for fabulous gifts.

Not the answer you're looking for?
Ask your own homework help question
Similar Questions
Use the following key to answer the following questions. Each answer may be used once, more...
Use the following key to answer the following questions. Each answer may be used once, more than once, or not at all.             A.  The statement is true for mitosis only.             B.  The statement is true for meiosis I only.             C.  The statement is true for meiosis II only.             D.  The statement is true for mitosis and meiosis I.             E.  The statement is true for mitosis and meiosis II. 46.__  Sporophytic plant cells produce the 4 haploid spore cells. 47.__  Dyads are aligned on the equatorial plate of...
Java question, Please answer everything. Thank you Answer the following questions as briefly (but completely) as...
Java question, Please answer everything. Thank you Answer the following questions as briefly (but completely) as possible: What is a checked exception, and what is an unchecked exception? What is NullPointerException? Which of the following statements (if any) will throw an exception? If no exception is thrown, what is the output? 1: System.out.println( 1 / 0 ); 2: System.out.println( 1.0 / 0 ); Point out the problem in the following code. Does the code throw any exceptions? 1: long value...
please answer questions 1 to 6. 1. What is the difference between these two words: bryophyte...
please answer questions 1 to 6. 1. What is the difference between these two words: bryophyte and Bryophyta? 2. Recall the moss life cycle. Which has more DNA a gametophyte cell or a sporophyte cell? In one sentence, explain why. 3. In 3-4 sentences, explain how bryophytes and seedless vascular plants are used as energy sources today. 4..In 2-3 sentences, provide two reasons why pollen is an advantageous adaptation for survival on land. 5. Several pieces of evidence exist for...
Short Answer Questions 1. Explain trade barriers and list two kinds of trader barriers. 2. Is...
Short Answer Questions 1. Explain trade barriers and list two kinds of trader barriers. 2. Is trade today different from the past? Please list three points to support your opinion. 3. In your opinion, what's the impacts of globalization on international trade? 4. Some people say international trade is always bad while some other people believe that international trade is always good. Do you think their opinions are right or wrong? Please defense your answer with what you learned in...
Short Answer Questions 1. Explain trade barriers and list two kinds of trader barriers. 2. Is...
Short Answer Questions 1. Explain trade barriers and list two kinds of trader barriers. 2. Is trade today different from the past? Please list three points to support your opinion. 3. In your opinion, what's the impacts of globalization on international trade? 4. Some people say international trade is always bad while some other people believe that international trade is always good. Do you think their opinions are right or wrong? Please defense your answer with what you learned in...
1. What are the key features of a typical project? 2. What is social complexity and...
1. What are the key features of a typical project? 2. What is social complexity and what is its role during project management? 3. How do you classify projects and why it makes sense to classify these in the first place? 4. What skills distinguish a project manager from a general manager? 5. What are the key goals in any project? How these relate to each other in the context of uncertainty? 6. What constitute a project's life cycle? why...
Please answer the following questions. 1- List at least three characteristics of data plotted on a...
Please answer the following questions. 1- List at least three characteristics of data plotted on a p , np , c, or u control chart that would indicate that a process is stable 2- If a process cycle is 24 hours, Explain How often you should sample this process in order for your data to be representative of all potential sources of variation? 3- If your defective rate is 4%, what should your sample size be in order for your...
(8 pts) Answer each of the following questions: (a) When did the Big Bang occur and...
(8 pts) Answer each of the following questions: (a) When did the Big Bang occur and what was the result? (b) Is "string theory" a proven scientific theory? Why or why not? (c) Where does the Strong Nuclear Force come into play? (d) What is Cosmology? (5 pts) If our Sun and solar system had formed at the same time as the very first stars in the universe, describe how and why our solar system would be different than the...
1. (4 pts) Consider all bit strings of length six. a) How many begin with 01?...
1. (4 pts) Consider all bit strings of length six. a) How many begin with 01? b) How many begin with 01 and end with 10? c) How many begin with 01 or end with 10? d) How many have exactly three 1’s? 2. (8 pts) Suppose that a “word” is any string of six letters. Repeated letters are allowed. For our purposes, vowels are the letters a, e, i, o, and u. a) How many words are there? b)...
For items 1-5 (2 pts each), use the following scores to calculate the descriptive statistics below:...
For items 1-5 (2 pts each), use the following scores to calculate the descriptive statistics below: 2, 4, 6, 8, 8, 8 1.   Mean =                                                                        4. Standard deviation = 2.   Mode =                                                                        5. Degrees of Freedom =             3.   Median =                                                                                                                         For items 6-7, use the data from a standardized test (m = 75, s = 10) that measures superhuman power. In addition to calculations, be sure to complete the distribution below by labeling...
ADVERTISEMENT
Need Online Homework Help?

Get Answers For Free
Most questions answered within 1 hours.

Ask a Question
ADVERTISEMENT