Writing
LWC How to Build Your Own Public Key Infrastructure Article Discussion

Lindsey Wilson College

Question Description

I’m working on a Computer Science exercise and need support.

Read the article “How to build your own public key infrastructure” and decide if this is something you could do. Explain why or why not. Your submission should be between 1200-1500 words with references and following APA writing standards.


No Plagarism

Student has agreed that all tutoring, explanations, and answers provided by the tutor will be used to help in the learning process and in accordance with Studypool's honor code & terms of service.

Final Answer

Attached.

Topic: Public Key Infrastructure (PKI)
-

Introduction

-

Why I would build a PKI

-

Conclusion

-

references


Running Head: PUBLIC KEY INFRASTRUCTURE

Public Key Infrastructure (PKI)
Name
Institution
Date

1

PUBLIC KEY INFRASTRUCTURE

2

Introduction
For any electronic transactions to take place, systems must be put in place to
electronically identify machines and people involved securely and reliably. Public key
technology – which uses digital certificates – is a very secure approach to identify and protect
the identity of people and data. Judging from the article, Public Key Infrastructure provides
ways for ensuring that risks in electronic business processes are reduced. After reading the
article by Sullivan (2015), I think PKI is something I would want to do or build for my
organization, and below are my reasons.
Why I would build a PKI
In the article, Sullivan (2015) explains the importance of securing network data,
especially when the data has to travel in a diverse network. He argues that for one to design
excellent security architecture, he or she must consider having multiple protection layers. He
goes ahead to explain how CloudFlare built its Public Key Infrastructure. After the reading, I
would summarize Sullivan’s definition of a PKI as “a set of software, hardware, procedures,
policies and roles needed to create, use, store, distribute, and manage public-key encryption
and revoke digital certificates.” It facilitates the secure transfer of data or information over a
network. PKI is important where simple authentication methods – such as the use of
passwords – are inadequate and where rigorous proof of identity is needed for parties
involved in a network communication for information being transferred to be validated
(Sulliva...

Kishnewt2017 (32440)
UCLA

Anonymous
I was on a very tight deadline but thanks to Studypool I was able to deliver my assignment on time.

Anonymous
The tutor was pretty knowledgeable, efficient and polite. Great service!

Anonymous
Heard about Studypool for a while and finally tried it. Glad I did caus this was really helpful.

Studypool
4.7
Trustpilot
4.5
Sitejabber
4.4
Similar Questions
Related Tags