Monday, April 29, 2019

Cis333 week 6 case study 2 Example | Topics and Well Written Essays - 1000 words

Cis333 week 6 2 - study Study ExampleThe increase in training related crimes is responsible for presence of enhanced teaching pledge in organizations today (Lindsey, 2014). Technically, motivations for learning related crimes are attributed to the economic importance of private learning in technology platforms. For example, cyber attackers seek secret and valuable information either for economic benefits or for terrorist act related causes. Whatever the motivating factors, organizations handling private information have a duty to nurture and prevent valuable information from ending up into wrong hands. Consequently, organizations typically utilize information security systems like Microsoft Server Active Directory domains, and Public Key Infrastructure to foster information security.Undeniably, some information security systems are better than others. As the Information Security Director for a software company, I would prefer the use of Public Key Infrastructure to Microsoft Server domain in safeguarding vital information inside the organization. Technically, Public Key Infrastructure, commonly abbreviated as PKI, is a system of standardized policies and sequenced procedures meant to mend the sharing of information (Kim & Michael, 2014). In the past, hackers have successfully penetrated network infrastructures by employing evasive action like sniffing, man-in-the-middle attack, and denial-of-service among others. These hacking tactics are usually easy to apply when attacking non encrypted networks. In this context, information security developers have lettered the benefits of encryption, and distribution of authentication components through independent digital certificates. In essence, Public Key Infrastructure combines the concepts of digital certificates and key encryption in maintaining network security (Carlisle & Lloyd, 2013).Digital certificates are essentially digitized signatures of the certificates holder. In conventional platforms, digital certificates would be

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.