Cryptography

As a future information security manager you know it is important to provide for the proper verification of identity when communicating online. Research the components of public key infrastructure to include the use of private and public keys, digital certificates, certificates of authority, secure socket layer, and transport layer security methods. These methods are used to safeguard and validate the authenticity of an individuals online identity when communicating across a network.

Create a 3-page MS Word document that explains each of these concepts and provide illustrations/diagrams to support your explanations. Your paper should also include a cover page and a citation page for a total of 5 pages.

Leave a Reply

Your email address will not be published. Required fields are marked *

You may use these HTML tags and attributes: <a href="" title=""> <abbr title=""> <acronym title=""> <b> <blockquote cite=""> <cite> <code> <del datetime=""> <em> <i> <q cite=""> <s> <strike> <strong>

Order Now

Top