Preview

PKI Paper

Good Essays
Open Document
Open Document
801 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
PKI Paper
There are several advantages of using a commercial PKI rather than implementing such a capability in-house with the software developers you already have. While in-house PKI solution can highly cost an organization with licenses and necessary infrastructure, a commercial PKI solution offers a service package with reliability, strong support, and indemnification.
Considering an in-house PKI structure, a company must factor in the cost of setting up a network infrastructure, network security, storage, redundancy, backup, and maintenance. Compare that to a commercial PKI solution, it is considered more profitable in the long run to pay for the service and not worry about all the factors above. It is mainly the control ability that drives companies toward an in-house PKI solution. In return, in-house PKI costs rise because it requires a separate security model including hardware storage solution in order to contain certificate repositories and public keys. The additional security model includes server, router, firewall, and IDS to keep hackers out. Additional software associated with a PKI infrastructure includes operating system for the server, Microsoft Certificate Server software or commercial based software, licensing, and secure backups. Due to the higher level of security requirements associated with PKI structures and private keys, the secure backups would be separated from the everyday backups found in a standard corporate backup system. Furthermore, a separate server is needed for certificate repository which will add even more costs and maintenance to an in-house design. On the other hand, using a commercial PKI would eliminate all those cost factors because most of those hardware and software infrastructure is located and maintained off-site which is included in the service price.
In a single service package, a commercial PKI provides reliability, support, and indemnification over in-house PKI solution. Commercial PKI offerings are relatively well-tested



Cited: Dzambasow , Yuriy (Aug 15, 2012). Requirements for in-house PKI. SecuritySolutions.com, from http://securitysolutions.com/mag/security_requirements_inhouse_pki/ In-house or out: how to start building a PKI. ComputerWeekly.com, from http://www.computerweekly.com/Articles/2003/07/29/196201/in-house-or-out-how-to-start-building-a-pki.htm Ars staff, (July 17, 2002). Wireless Security Blackpaper. Ars Technica, from http://arstechnica.com/security/news/2002/07/security.ars

You May Also Find These Documents Helpful

  • Good Essays

    Furthermore, entities A and B can now use end-to-end confidentiality and integrity services without the cooperation of any third entity. For example, users can exchange secure e-mail and securely access Web content on an intranet. Another advantage is that private keys are typically 1024-bit-long strings and cannot be guessed the way that passwords can. Therefore, you can use certificates for strong authentication.…

    • 575 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    Nt1310 Unit 8 Lab 1

    • 421 Words
    • 2 Pages

    Designing CA infrastructure – establishing a framework of linked CAs that are responsible for issuing, validating, renewing and revoking certificates as needed.…

    • 421 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Richman Investment needs and new enterprise encryption strategy. This is for a more secure network. They are wanting to grow to 10,000 employees worldwide. Richman Investment wants to operate out of 20 different countries in the future. This is very easy to do but to have a secure network there are many things that would have to happen which will make this more difficult to do. Have a secure network takes a lot of work and has to be monitored 24 hours a day 7 days a week. There are many different ways to go about this topic the one I am going to pick is a public key infrastructure (PKI).…

    • 444 Words
    • 2 Pages
    Satisfactory Essays
  • Better Essays

    It255 Project Part 1

    • 634 Words
    • 3 Pages

    Pyle, N. (2009, September 01). Designing and implementing a pki: Part i design and planning. Retrieved from…

    • 634 Words
    • 3 Pages
    Better Essays
  • Good Essays

    lab 8 Access Controls

    • 943 Words
    • 4 Pages

    Supports cross-certification of other CA server hierarchies on the Enterprise Corporate Private Enterprise private network.…

    • 943 Words
    • 4 Pages
    Good Essays
  • Good Essays

    Unit 14 P1

    • 1252 Words
    • 6 Pages

    Another part is that running your own server is very time consuming as if you have another job a personal server may struggle to be maintained. Where as having a commercial provider you will just have to use it not maintain and check for intrusions. Lastly having your own server means that you will need a larger bandwidth as your usual one will be more expensive and may make the server run slower, this means that it may add costs in other respects, where as a commercial provider is a cost pay yearly which is a one of payment, which no additional extra fees, which means its easier to plan how much it may cost…

    • 1252 Words
    • 6 Pages
    Good Essays
  • Powerful Essays

    CSEC 630 Final Exam

    • 1055 Words
    • 4 Pages

    This examination is worth 20 percent of your total grade. There are five semi open ended questions (worth 70 points) along with an accompanying cyber security action plan template (worth 30 points). You are to answer each of the five questions and to complete the Cyber Security Action Plan template based on best practices and your understanding of the case.…

    • 1055 Words
    • 4 Pages
    Powerful Essays
  • Good Essays

    Paper 1

    • 928 Words
    • 4 Pages

    Background checks are a useful tool for employers to determine the fit of a candidate to the organization. They pull up any issues or discrepancies that may not have been provided by the candidate during the interview. It is very important that during the interview, the candidate is advised that there will be a background and reference check conducted so that they cannot say they did not know. After the background check has come back, the interviewer needs to decide whether or not to hire the candidate.…

    • 928 Words
    • 4 Pages
    Good Essays
  • Good Essays

    Cac Card

    • 1716 Words
    • 7 Pages

    Public key infrastructure (pki) certificates that enable cardholders to "sign" documents digitally, encrypt and decrypt emails, and establish secure online network connections.…

    • 1716 Words
    • 7 Pages
    Good Essays
  • Powerful Essays

    Author Paper

    • 1277 Words
    • 6 Pages

    Maya Angelou was born Marguerite Johnson on April 4, 1928, in St. Louis, Missouri (poets.org). Maya Angelou later changed her name to promote her writing. Maya- represents the childhood name her brother Bailey gave her and Angelou is a variation of her married last name. At the age of three her parents sent her and her younger brother Bailey to live with their paternal grandmother in Stamps, Arkansas.…

    • 1277 Words
    • 6 Pages
    Powerful Essays
  • Satisfactory Essays

    Or you may want a full service package from the private practice management company where they manage all your reporting, invoicing and filing systems so that your full medical team is doing work they are qualified for. The main benefits of outsourcing private practice management are you can focus on your main objective of treating and caring for patients, your cash flow is maximised, processes are streamlined therefore faster and more accurate, electronic invoices are validated before they are sent out and patients will be able to pay for their medical bills by credit or debit card. The less time spent on administrative duties that can be handed over to external private practice management the more resources can be spent on more patients and their welfare. Private practice management services can chase paper trails and invoice discrepancies from creating invoices on your current financial system through to recovering outstanding invoices or raising credit…

    • 376 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Abstract This paper investigates the under-researched area of key account management (KAM) implementation through a systematic review of the literature, syndications with a panel of industry exemplars, and a survey investigating how organisations implement KAM. Through this we identify a stage model that identifies not only how companies currently transition to KAM in practice, but also suggests how they could improve their chances of success in transitioning to KAM. We demonstrate the fundamental elements of a KAM programme and the extent to which companies feel KAM has met their pre-implementation expectations.…

    • 3956 Words
    • 16 Pages
    Powerful Essays
  • Good Essays

    Cisco Meraki Case Study

    • 789 Words
    • 4 Pages

    Cisco Meraki products are leader in cloud-managed and cloud-based solutions in the last decade. They provide a high level of security with the two-factor authentication method as well as out-of-band architecture (with HIPAA/PCI compliant). Besides, Cisco Meraki devices are trustworthy in terms of the reliability (99.99% on SLA) and the implemented Available Redundant Architecture. The various security tools to prevent from unusual outsider activities and security assurance regarding backup and storage, data mobility’s make Cisco Meraki taking the top place when we talk about cloud-based technologies. [55][83][84]…

    • 789 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    Wic Paper

    • 677 Words
    • 3 Pages

    Special Supplement Nutrition Program for Women, Infants and Children (WIC) Gisselle Ashe Robin Palmer Kristina Parson April 16, 2013 Dr. Jackson…

    • 677 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Admaya

    • 314 Words
    • 2 Pages

    8. For consumers, less risk. People tend to choose the brand-name supplier over the no-name one when afraid of the consequences of a messup…

    • 314 Words
    • 2 Pages
    Satisfactory Essays