• Home
  • Blog
  • Massachusetts Institute of Technology Encryption and Cybersecurity Architecture Discussion

Massachusetts Institute of Technology Encryption and Cybersecurity Architecture Discussion

0 comments

I’m trying to study for my Computer Science course and I need some help to understand this question.

Discussion post is 200 word and 2 responses of 50 words each

Public Key Infrastructure (PKI) is an encryption and cybersecurity architecture for managing digital certificates and communication encryption. PKI can be used to ensure secure electronic transfer, provide authentication for communications requiring data integrity and stringent proof of identity. The public/private keys created as part of PKI digital certificates can be used to provide a variety of very useful security services including digital signatures and non-repudiation.

As the CSO, you’ve been asked to brief the management team on how digital signatures and non-repudiation can be provided through a PKI and what the potential benefits to their use would be.

Research using the web or the Strayer Library to identify how digital signature and non-repudiation services can be provided under a PKI and what benefits these services and features could provide the company. Provide a set of talking points for use in briefing the management team.

answer 2 classmates

Carlos johnson

Professor and Classmates,

A digital signature is a technique used to authenticate messages and prevent them from being altered or changed while they are in transit. Signing private keys are responsible for message encryption. Users decrypt a private signing key by associated public signing key. When the decryption is performed successfully, the message is established in which the identity of a sender or owner is revealed and in which it acts as a verification that shows that the message was signed; hence, it was not altered during transit (Cioffi & Fallows, 2018). Non-repudiation, on the other hand, is defined as a way or concept that is applied in ensuring that the message sender or receiver cannot disown a message or deny receiving or sending a particular message (Blokdyk, 2019). It is used to confirm ownership of electronic messages and documents. The cybersecurity and encryption architecture in which server (website) to client (user) communication is secured is known as public key infrastructure (PKI).

PKI uses a two-key encryption system. It assists in the safe transfer of electronic information to and from consumers by giving each user public and private keys for encoding and decoding data using certificates or signatures. Digital certificates are used to perform user or machine identity verification (Roebuck, 2019). When the signature is given from a trustworthy and well-known source on the server, the certificate is recognized as proof of identification.

Digital signature and non-repudiation through public key infrastructure have many benefits to a company. PKI provides high and reliable security protection during online communication processes. By validating and transferring data between enterprise users and servers, PKI enables the creation of safe and trustworthy corporate settings (Roebuck, 2019). With the help of digital signatures, PKI can provide trust that is used in securing many companies’ software and applications. Based on cyberattacks’ continuous innovations and growth, KPI provides essential company data and information protection against breach, interception, or alteration.

References

Blokdyk, G. (2019). Authentication non-repudiation is the ultimate step-by-step guide. 5STARTcooks.

Cioffi, C., & Fallows, R. (2018). Digital signature feasibility study. Retrieved from https://apps.azdot.gov/ADOTLibrary/publications/pr…beside link iconbeside link iconbeside link iconbeside link iconbeside link iconbeside link iconbeside link iconbeside link iconbeside link iconbeside link iconbeside link iconbeside link icon

Roebuck, K. (2019). Public key infrastructure (PKI): High-impact strategies – What you need to Know: Definitions, Adoptions, impact, benefits, maturity, vendors. Tebbo.

.

classmate 2

jarrad

Hello Class,

Public Key Infrastructure has become a key architecture for businesses that wish to conduct communication over the internet for a number of reasons. With PKI a digital certificate is used to provide authentication and privacy to any party that is associated with the transmission of the information. With a PKI authentication is provided through trusted organizations which issue digital certificates and provide ways for identifying individuals that hold those digital certificates. With a digital certificate information can be protected because it can be encrypted ensuring that only the intended recipient can read it therefore increasing privacy and security.

PKI can also be used for non repudiation and can improve overall security. With PKI a unique signature can be created and therefore a sender is unable to deny that they sent a message. Another benefit with PKI is that you are able to ensure that the integrity of a message has not been compromised. The recipient of a message is able to check if the message has been altered or tampered with during transmission which is a key concern anytime you send messages over the internet. Overall PKI ensures that messages sent are protected with the use of digital certificates and therefore is a key architecture that should be employed to keep the information you send safe.

source:

1. https://www.anz.com/institutional/online-security/public-key-infrastructure/key-pki-benefits/

About the Author

Follow me


{"email":"Email address invalid","url":"Website address invalid","required":"Required field missing"}