Your Perfect Assignment is Just a Click Away
We Write Custom Academic Papers

100% Original, Plagiarism Free, Customized to your instructions!

glass
pen
clip
papers
heaphones

Public Key Infrastructure Response

Public Key Infrastructure Response

Provide (2) 150 words response with a minimum of 1 APA references for RESPONSES 1 AND 2 below. Response provided should further discuss the subject or provide more insight. To further understand the response, below is the discussion post that’s discusses the responses. 100% original work and not plagiarized. Must meet deadline.

RESPONSE 1
Which one of the following statements is most correct about data encryption as a method of protecting data?

For this week’s forum we had to review or examine statements that were provided to us. To answer the above question, I chose to discuss is number 4: it requires key management. Key management refers to the process of managing cryptographic keys for a system. The management involves the creation, exchanges, and protection of these keys. Key management is also involved in monitoring and accesses made by individuals in the system. Encrypted messages can be read by authorized users, but not by those who do not have permission. One good way to practice good key management practices is to physically make sure hardware and all systems being used are store properly, and securely from anyone who can easily access them physically. Another great practice to make sure that all of the systems is up to date. It is also important to have a key life cycle, like we learned in our labs for last week. To also make sure that they are properly stored somewhere other than the systems in which they are used in to make sure that there is a back up if something bad were to happen. Performing audits can prevent from cryptic keys to get hacked or stolen. Audits can also ensure

RESPONSE 2
I hope everyone is having a good week so far. This week we are talking about public key infrastructure and data encryption as a method of protecting data. Out of the options we were given I would say that careful key management is the most correct. We as humans lose things all the time. I know I always misplace my phone and the tv controller. OOPS lol.

When looking at key management there are 3 different types of protocols with the main goal being centralized. You want the key to be able to move through the department. To implement centralized protocols you need the proper equipment, policies in place to handle the keys and processes to implement the activities.”Centralized key management enables proper key governance, even when data and people move from department to department throughout an organization” (Kazarian, 2019). “If your key server capabilities don’t mesh well with the key governance requirements, implementing centralized key management becomes very difficult” (Kazarian, 2019).

Resources:

Kazarian, J. (2019, January 22). An essential guide to encryption key management in the enterprise. Retrieved June 30, 2020, from https://techbeacon.com/security/centralized-encryption-key-management-why-you-need-it-how-deploy-it

“Place your order now for a similar assignment and have exceptional work written by our team of experts, guaranteeing you A results.”

Order Solution Now

Our Service Charter

1. Professional & Expert Writers: Topnotch Essay only hires the best. Our writers are specially selected and recruited, after which they undergo further training to perfect their skills for specialization purposes. Moreover, our writers are holders of masters and Ph.D. degrees. They have impressive academic records, besides being native English speakers.

2. Top Quality Papers: Our customers are always guaranteed of papers that exceed their expectations. All our writers have +5 years of experience. This implies that all papers are written by individuals who are experts in their fields. In addition, the quality team reviews all the papers before sending them to the customers.

3. Plagiarism-Free Papers: All papers provided byTopnotch Essay are written from scratch. Appropriate referencing and citation of key information are followed. Plagiarism checkers are used by the Quality assurance team and our editors just to double-check that there are no instances of plagiarism.

4. Timely Delivery: Time wasted is equivalent to a failed dedication and commitment. Topnotch Essay is known for timely delivery of any pending customer orders. Customers are well informed of the progress of their papers to ensure they keep track of what the writer is providing before the final draft is sent for grading.

5. Affordable Prices: Our prices are fairly structured to fit in all groups. Any customer willing to place their assignments with us can do so at very affordable prices. In addition, our customers enjoy regular discounts and bonuses.

6. 24/7 Customer Support: At Topnotch Essay, we have put in place a team of experts who answer to all customer inquiries promptly. The best part is the ever-availability of the team. Customers can make inquiries anytime.