logo

Development of Deploy Public Key Infrastructure

   

Added on  2022-11-29

4 Pages508 Words281 Views
Running head: DEVELOPMENT OF DEPLOY PUBLIC KEY INFRASTRUCTURE
Development of deploy public key infrastructure (PKI) and encryption solutions to protect data
and information
Name of the student:
Name of the University:

1DEVELOPMENT OF DEPLOY PUBLIC KEY INFRASTRUCTURE
Plan for Public Key Infrastructure (PKI)
Public Key Infrastructure (PKI) is a collection of procedure and policy that are
collectively used by different business and organizations to create, manage, use, transfer and also
revoke the digital security certificates (Huang & Nicol, 2017). The three different steps should
be followed include deployment of offline root CA, create the authority information access and
certification revocation list and deployment of an enterprise subordinate CA. In order to prepare
the PKI environment the five parts those are to be considered include certification authority,
registration authority, certificate database, certificate store and key archival server. Quality
Medical Company requires incorporating disaster recovery plan, data backup and application
resilience plan as well. The certificates those are signed by the authority will not be trusted by
the local authority therefore proper security measures are much essential.
In addition to this, proper security policy, intellectual property laws are also required to
be conducted by the company owners to keep the information secured from the unwanted
external attackers. It will help to keep the sensitive data confidential (Chang, Arianezhad &
Trajković, 2016). The chief security officer of the company should use encryption and
decryption mechanism by using a shared symmetric key. The key will allow only the authorized
users to decrypt the cipher text to plain text. Apart from this, information asset protection policy
and techniques are also required to be incorporated by the information security head. Information
related to customer, employees and users are required to be timely updated (Lozupone, 2018).
However, the company requires possessing legislative and regulatory laws as well to keep away
multidimensional challenges. Active directory certificate service should create new private key
for root CA.

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Public Key Infrastructure and its Applications
|7
|850
|274

Cryptography and Security Protocols for Data Protection - Desklib
|6
|1420
|320

Digital Certificate Technology - Doc
|10
|2598
|295

Public-Key Infrastructure (PKI) - Importance, Working, and Benefits
|10
|2275
|404

Secure Encryption Technologies: A Comprehensive Guide
|15
|586
|240

Wireless network Concepts Assignment
|11
|2890
|43