Verified Document

Public Key Infrastructure Email Communication Has Strongly Case Study

Public Key Infrastructure Email communication has strongly increased in the last couple of years and its still growing. It's hard to find a company which doesn't use email to run its business processes both within the company and with external business partners and clients. Therefore, the eminent security threat to the company's network infrastructure and content of the company products should be priories. The use of Public Key Infrastructure (PKI) would eliminate the threat. Public key infrastructure (PKI) can be defined as the use of public key and private key pair for authentication and proof content (H Johner, 2010).

Its combined hardware and software component, policies and different procedures together to avail stick security regulation. The public key infrastructure (PKI) is called certificate and work as digital indemnification. It offers certainty of quality of information sent and received electronically and the source and destination of such information. The information with a public key infrastructure can be used as assurance or evidence before the court law (IQ Suite, 2009).

However, there are varies component of public key infrastructure (PKI) which is used to maintain high security of emails and other data component of a company. Such uses encryption, digital signatures, public keys, private keys, digital certificates, certificate authorities, certificate revocation and storage when sending an email. This it protect the content of the data or information being convey (IQ Suite, 2009).

Digital Certification

Digital Certification is an attachment to an electronic message used for security purposes. It's most common used...

Therefore, an individual wishing to send an encrypted message applies for a digital certificate from a Certificate Authority (CA).
The CA issues an encrypted digital certificate containing the applicant's public key and a variety of other identification information. The CA makes its own public key readily available through print publicity or perhaps on the Internet. The recipient of an encrypted message uses the CA's public key to decode the digital certificate attached to the message, verifies it as issued by the CA and then obtains the sender's public key and identification information held within the certificate. With this information, the recipient can send an encrypted reply (Adonis, 2005).

The digital certification compost of a sender public key, sender name, expiration data of the sender key, name of the certificate issuer, serial number of the certificate and digital signature of the issuer. This to ensure that every information or email sent is highly secure and can't be accessed by any unauthorized person (R Kohlas, 2009).

Certificate Authority

A certificate authority (CA) is an authority in a network that issues and manages security credentials and public keys for message encryption. This is part of a public key infrastructure (PKI), a CA checks with a registration authority (RA) to verify information provided by the requestor of a digital certificate. If the registration authorization verifies the requestor's information, then the certificate authority can then issue a certificate. After that…

Sources used in this document:
Reference

IQ Suite (2009). Public-Key Infrastructures and the Encryption Methods PGP and S/MIME

PKI Fundamentals -- iQ

Adonis (2005). An Introduction to PKI (Public Key Infrastructure)

Site: http://www.articsoft.com/public_key_infrastructure.htm
Cite this Document:
Copy Bibliography Citation

Related Documents

It Security Plan & Implementation
Words: 5733 Length: 16 Document Type: Research Proposal

Second, the specific connection points throughout the network also need to be evaluated for their levels of existing security as well, with the WiFi network audited and tested (Loo, 2008). Third, the Virtual Private Networks (VPNS) and the selection of security protocols needs to be audited (Westcott, 2007) to evaluate the performance of IPSec vs. SSL protocols on overall network performance (Rowan, 2007). Many smaller corporations vacillate between IPSec

Overarching Goal of This Study
Words: 18833 Length: 75 Document Type: Essay

Good researchers tend to pull methods out of a tool kit as they are needed" (2006, p. 54). Notwithstanding these criticisms and constraints, though, most social researchers seem to agree that classification by some type of research paradigm is a useful approach based on the need to determine which approach is best suited for a given research enterprise. In this regard, Corby concludes that, "The contested nature of research

Aloud or in Writing, Making
Words: 17261 Length: 55 Document Type: Thesis

Companies such as XYZ Widget Corporation are well situated to take advantage of burgeoning markets in developing nations, particularly in Asia and Africa. 2. XYZ can grow its business by expanding its operations to certain developing nations in ways that profit the company as well as the impoverished regions that are involved, particularly when marketing efforts are coordinated with nongovernmental organizations operating in the region. 3. Several constraints and challenges must

Electronic Health Records EHR --
Words: 6203 Length: 15 Document Type: Case Study

They also claim to have worked on more than 1,400 mobile applications. (www.babelmedia.com) Beta Breakers is a relatively new entrant into the market but has achieved $7.7 million in revenues. Their focus is games and multi-media testing, but they seem to be focused primarily on PC and Mac games (not console), as well as peripheral device testing. Their rapid growth could be attributable to a dedicated focus on this particular

Security Issues in IEEE Wlan
Words: 6613 Length: 20 Document Type: Term Paper

Despite its clear benefits and advantages in terms of ease of use and cost effectiveness, there are certain risks associated with wireless networking. These risks are discussed further below. Review of the Literature. Security Risks Associated with IEEE WLAN 802.11. The applications for wireless communication technology continue to develop and expand; today, at least, the 802.11b is the standard of choice for wireless router communication used with network installation (Gonazles & Higby

Developmental Learning and Technology
Words: 9878 Length: 15 Document Type: Essay

Elementary Special Education Teachers Place Value in the use of Technology Resources for Students? Alix Desulme Technology is an integral part of society. Students learn through use of technology like personal computers, tablets, and e-books (Garland & Tadeja, 2013). Computers can provide access to videos, documents, and other forms of data that students have the choice of absorbing via visual or auditory methods. Tablets provide the same access but with a

Sign Up for Unlimited Study Help

Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.

Get Started Now