Sunday, October 6, 2019
Cis333 week 6 case study 2 Example | Topics and Well Written Essays - 1000 words
Cis333 week 6 2 - Case Study Example The increase in information related crimes is responsible for presence of enhanced information security in organizations today (Lindsey, 2014). Technically, motivations for information related crimes are attributed to the economic importance of private information in technology platforms. For example, cyber attackers seek secret and valuable information either for economic benefits or for terrorism related causes. Whatever the motivating factors, organizations handling private information have a duty to protect and prevent valuable information from ending up into wrong hands. Consequently, organizations typically utilize information security systems like Microsoft Server Active Directory domains, and Public Key Infrastructure to foster information security. Undeniably, some information security systems are better than others. As the Information Security Director for a software company, I would prefer the use of Public Key Infrastructure to Microsoft Server domain in safeguarding vital information inside the organization. Technically, Public Key Infrastructure, commonly abbreviated as PKI, is a system of standardized policies and sequenced procedures meant to secure the sharing of information (Kim & Michael, 2014). In the past, hackers have successfully penetrated network infrastructures by employing tactics like sniffing, man-in-the-middle attack, and denial-of-service among others. These hacking tactics are usually easy to apply when attacking non encrypted networks. In this context, information security developers have learned the benefits of encryption, and distribution of authentication components through independent digital certificates. In essence, Public Key Infrastructure combines the concepts of digital certificates and key en cryption in maintaining network security (Carlisle & Lloyd, 2013). Digital certificates are essentially digitized signatures of the certificateââ¬â¢s holder. In conventional platforms, digital certificates would be
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.