SEC280 Course Discussions Week 3

$8.50

SEC280 Course Discussions Week 3
Discuss or describe how asymmetric encryption allows PKI to function. Also, how does symmetric encryption…

SKU: SEC280 Discussions Week 3 Categories: , Tags: , , ,

Description

SEC280 Course Discussions Week 3

SEC280 Course Discussions Week 3

All Students Posts – 28 Pages 

Asymmetric Versus Symmetric Encryption – 15 Pages 

Discuss or describe how asymmetric encryption allows PKI to function. Also, how does symmetric encryption work to protect files?

Hackers are given a bad name but I found out that is not necessarily true. As you stated the good people need someone to help them fight against cyber criminals.  Some people crack systems for the thrill of it while others do it to gather sensitive information or even sell information.  Some of the best hackers work for authorities including former cyber criminals.

Here is a something interesting a lot of people are still unaware of, a hacker certification.

The Certified Ethical Hacker program is the pinnacle of the most desired information security training program any information security professional will ever want to be in. To master the hacking technologies, you will need to become one, but an ethical one! The course provides the tools and techniques used by hackers and information security professionals alike to break into an organization. As we put it, “To beat a hacker, you need to think like a hacker”…

Trust Models – 13 Pages 

Let’s compare and contrast the hierarchical trust model, the peer-to-peer trust model, and the hybrid trust model.

In the book, hierarchical trust model is a structure that contains a root CA, intermediate CA, leaf CA, and end entities. The root CA is the ultimate trust anchor for all other entities in the infrastructure and it generates certificates for the intermediate CAs, which goes to generate certificates for the leaf CAs then generate certificates toward the end entities.  Also the peer to peer trust model has one CA and it’s not connected to another CAs, which no established trusted anchor between the CAs is involved in the peer to peer trust model…