1. Public Keys and Public Certificates can be stored in the Central Repository. It is not the same as the Public Key Infrastructure, but it is not the same.
2. Decryption key
3. Authentication Header is used to prove the identity of the sender and ensure the data is not tampered with. A Encapsulated Security Payload provides authentication and encryption and encrypts the IP packets and ensures their integrity.
4.
1. Create Enrollment Object
2. Set Enrollment Parameters
3. Create Request
4. Submit Request
5. Process request
6. Get Certificate
7. Accept Certificate
5. Some of the advantages are: Straight-forward Concept, Chain-length limit, and less time to obtain a usable certificate within the CA
Some of the disadvantages are: Scalability, Single point of trust, and …show more content…
Designing CA infrastructure – establishing a framework of linked CAs that are responsible for issuing, validating, renewing and revoking certificates as needed.
7.
1. Determine what databases will be used for PKI?
2. What are the legal and policy considerations for the C-I-A?
3. Who will have access to the systems and how will this access be monitored?
8. The main function of the certutil.exe command line tool is to display information about the digital certificates that are installed on a direct access client, direct access server or intranet resource.
9. An open-source implementation of the SSL and TLS protocols. The core library, written in the C programming language, implements the basic cryptographic functions and provides various utility functions.
10. Single sign-on (SSO) is a property of access control of multiple related, but independent software systems. With this property a user logs in once and gains access to all systems without being prompted to log in again at each of them. Microsoft SharePoint Server
11. True
12. Relate back to the C-I-A tenets of information systems security. Hashing provides file versioning while encryption provides file