Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

The external CA is responsible for the security of Public Key Infrastructure. External parties normally trust a digital certificate signed by a trusted external CA,

The external CA is responsible for the security of Public Key Infrastructure.

External parties normally trust a digital certificate signed by a trusted external CA, such as VeriSign.

The cost of a PKI solution is just one part of total costs. IT leaders need to consider all costs staff investment, infrastructure, maintenance, and future requirements to drive desired digital business outcomes.

The architecture of PKI consists of A certificate authority (CA) that stores, issues and signs the digital certificates. A registration authority (RA) which verifies the identity of entities requesting their digital certificates to be stored at the CA.

The PKI approach to security does not take the place of all other security technologies, it is an alternative means of achieving security.

AD CS is the Server Role that allows you to build public key infrastructure (PKI) and provide public-key cryptography, digital certificates, and digital signature capabilities for your organization.

Question: A classmates with a quality question for full credit. Must post first. Ubiquitous connectivity, m...

Edit question

A classmates with a quality question for full credit.

Must post first.

Ubiquitous connectivity, mobility, and cloud computing are driving the growth of digital business and the development of disruptive business models across all industries. As a result, data volumes are skyrocketing, and traditional security perimeters are evaporating at a record pace. The need to evolve from a tactical to a strategic view of digital trust is at the heart of this transformation to digital business. According to Gartner:

  • By 2025, 20% of digital businesses with strong digital trust strategies will grow at double the percentage rate of those with poor digital trust efforts. (How to Manage New Trust Issues for Brands in Digital Business 24 May 17)
  • By 2020, companies that are digitally trustworthy will generate 20% more online profit than those that are not. (The Gartner Digital Commerce Vendor Guide, 2017 11 Jul 17)

To prepare for these challenges, an increasing number of businesses are deploying public key infrastructures (PKIs) to secure the expanding ecosystem of users, devices, applications, and things. A PKI supports the distribution and identification of public encryption keys, enabling users and computers to securely exchange data over public networks like the Internet. Already an established and proven technology, PKI is even more relevant today as the need to securely authenticate a growing digital ecosystem continues to grow.

Three popular PKI vendors are Entrust Inc., VeriSign Inc. and RSA Security, now owned by EMC Corp.

DISCUSSION QUESTION: You are a security engineer for a company of 1,000 employees. Your boss has asked you what you need to consider to implement a PKI at your company. He has heard that PKI comes with Windows Server. What are the features and benefits of implementing PKI with Windows Server? What are some things you need to consider as a company and leader? What are the benefits of purchasing a PKI system from one of the top vendors?

If I were a security engineer for a company with 1,000 employees and my boss had asked me what I would take into consideration for a PKI for the company, I would look at:

  • CIA (confidentiality, integrity, and availability)
  • Buy or build
  • CA database

Some of the features that come with Windows Server are:

    • Digital signatures
    • Secure e-mail
    • Internet authentication
    • IP security
    • Smart card logon
    • Encrypting file system user and recovery certificates
    • Authentication of network devices

Some of the things to consider as a company and leader are:

    • Integrity
    • Manageability
    • Security policy
    • Flexibility and scalability
    • CA type

The benefits of purchasing a PKI system from one of the top vendors are the following:

    • Certificate application
    • Certificate application processing
    • Certificate issuance
    • Certificate acceptance
    • Key pair and certificate usage
    • Certificate renewal
    • Certificate re-key
    • Certificate modification
    • Certificate revocation and suspension
    • End of subscription
    • Key escrow and recovery

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image_2

Step: 3

blur-text-image_3

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Students also viewed these Databases questions