{[ promptMessage ]}

Bookmark it

{[ promptMessage ]}

Planning A Microsoft Windows Server 2003 Network Chapter 09

Planning A Microsoft Windows Server 2003 Network Chapter 09...

Info icon This preview shows pages 1–13. Sign up to view the full content.

View Full Document Right Arrow Icon
70-293: MCSE Guide to Planning a Microsoft Windows Server 2003 Network Chapter 9: Planning and Managing Certificate Services
Image of page 1

Info icon This preview has intentionally blurred sections. Sign up to view the full version.

View Full Document Right Arrow Icon
70-293: MCSE Guide to Planning a Microsoft Wi 2 Objectives Describe the types of cryptography Understand how cryptography is used for encryption and digital signatures Understand the components of Certificate Services Install and manage Certificate Services Manage certificates Implement smart card authentication
Image of page 2
70-293: MCSE Guide to Planning a Microsoft Wi 3 Cryptography Cryptography: encrypting/decrypting data to ensure they are read only by the intended recipient Encrypted messages are unreadable Decryption Reverse of encryption Makes the data readable again
Image of page 3

Info icon This preview has intentionally blurred sections. Sign up to view the full version.

View Full Document Right Arrow Icon
70-293: MCSE Guide to Planning a Microsoft Wi 4 Cryptography (continued) Four objectives of cryptography Confidentiality Integrity Nonrepudiation Authentication
Image of page 4
70-293: MCSE Guide to Planning a Microsoft Wi 5 Cryptography (continued) Cryptography uses keys: A large number (a series of numbers, letters, and symbols) Large and difficult to guess Used with an algorithm to encrypt and decrypt data Three types of encryption Symmetric Asymmetric Hash
Image of page 5

Info icon This preview has intentionally blurred sections. Sign up to view the full version.

View Full Document Right Arrow Icon
70-293: MCSE Guide to Planning a Microsoft Wi 6 Symmetric Encryption Uses a single key A computer can symmetrically encrypt large amounts of data quickly Used when encrypting files and large amounts of data across network transmissions
Image of page 6
70-293: MCSE Guide to Planning a Microsoft Wi 7 Asymmetric Encryption Uses two keys: public key and private key Anything encrypted by the public key can be decrypted with the private key and vice versa
Image of page 7

Info icon This preview has intentionally blurred sections. Sign up to view the full version.

View Full Document Right Arrow Icon
70-293: MCSE Guide to Planning a Microsoft Wi 8 Hash Encryption Hash encryption is unique because it is one-way Hash algorithm uses a single key to convert data to a hash value The hash value is a summary of the data The purpose of a hash value is to be a unique identifier, not to secure data
Image of page 8
70-293: MCSE Guide to Planning a Microsoft Wi 9 Uses for Cryptography Three common tasks that use different types of encryption are: Encrypting e-mail Ensuring data integrity with digital signatures Securing data communication with Secure Sockets Layer (SSL)
Image of page 9

Info icon This preview has intentionally blurred sections. Sign up to view the full version.

View Full Document Right Arrow Icon
70-293: MCSE Guide to Planning a Microsoft Wi 10 Encrypting E-mail Encrypting e-mail ensures that a message in transit cannot be read by unauthorized people Uses the public and private keys of the recipient: Sender creates an e-mail message E-mail software encrypts using the recipient’s public key Recipient’s public key may be published in a directory or given to the sender via e-mail before encryption Encrypted message is then sent to the recipient Recipient’s e-mail software decrypts the message using the recipient’s private key
Image of page 10
70-293: MCSE Guide to Planning a Microsoft Wi 11 Encrypting E-mail (continued)
Image of page 11

Info icon This preview has intentionally blurred sections. Sign up to view the full version.

View Full Document Right Arrow Icon
70-293: MCSE Guide to Planning a Microsoft Wi 12 Digital Signatures A digital signature is a hash value that is encrypted
Image of page 12
Image of page 13
This is the end of the preview. Sign up to access the rest of the document.
  • Spring '09
  • GeorgeWayneRausch
  • Public key infrastructure, Public-key cryptography, Certificate authority, Microsoft Windows Server

{[ snackBarMessage ]}

What students are saying

  • Left Quote Icon

    As a current student on this bumpy collegiate pathway, I stumbled upon Course Hero, where I can find study resources for nearly all my courses, get online help from tutors 24/7, and even share my old projects, papers, and lecture notes with other students.

    Student Picture

    Kiran Temple University Fox School of Business ‘17, Course Hero Intern

  • Left Quote Icon

    I cannot even describe how much Course Hero helped me this summer. It’s truly become something I can always rely on and help me. In the end, I was not only able to survive summer classes, but I was able to thrive thanks to Course Hero.

    Student Picture

    Dana University of Pennsylvania ‘17, Course Hero Intern

  • Left Quote Icon

    The ability to access any university’s resources through Course Hero proved invaluable in my case. I was behind on Tulane coursework and actually used UCLA’s materials to help me move forward and get everything together on time.

    Student Picture

    Jill Tulane University ‘16, Course Hero Intern