Planning A Microsoft Windows Server 2003 Network Chapter 09

Planning A Microsoft Windows Server 2003 Network Chapter 09...

Info iconThis preview shows pages 1–13. Sign up to view the full content.

View Full Document Right Arrow Icon

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
This is the end of the preview. Sign up to access the rest of the document.

Unformatted text preview: 70-293: MCSE Guide to Planning a Microsoft Windows Server 2003 NetworkChapter 9: Planning and Managing Certificate Services70-293: MCSE Guide to Planning a Microsoft Wi2ObjectivesDescribe the types of cryptographyUnderstand how cryptography is used for encryption and digital signaturesUnderstand the components of Certificate ServicesInstall and manage Certificate ServicesManage certificatesImplement smart card authentication70-293: MCSE Guide to Planning a Microsoft Wi3CryptographyCryptography: encrypting/decrypting data to ensure they are read only by the intended recipientEncrypted messages are unreadableDecryption Reverse of encryptionMakes the data readable again70-293: MCSE Guide to Planning a Microsoft Wi4Cryptography (continued)Four objectives of cryptographyConfidentialityIntegrityNonrepudiationAuthentication70-293: MCSE Guide to Planning a Microsoft Wi5Cryptography (continued)Cryptography uses keys:A large number (a series of numbers, letters, and symbols)Large and difficult to guessUsed with an algorithm to encrypt and decrypt data Three types of encryptionSymmetricAsymmetricHash70-293: MCSE Guide to Planning a Microsoft Wi6Symmetric EncryptionUses a single key A computer can symmetrically encrypt large amounts of data quicklyUsed when encrypting files and large amounts of data across network transmissions70-293: MCSE Guide to Planning a Microsoft Wi7Asymmetric EncryptionUses two keys: public key and private keyAnything encrypted by the public key can be decrypted with the private key and vice versa70-293: MCSE Guide to Planning a Microsoft Wi8Hash EncryptionHash encryption is unique because it is one-wayHash algorithm uses a single key to convert data to a hash valueThe hash value is a summary of the dataThe purpose of a hash value is to be a unique identifier, not to secure data70-293: MCSE Guide to Planning a Microsoft Wi9Uses for CryptographyThree common tasks that use different types of encryption are:Encrypting e-mailEnsuring data integrity with digital signaturesSecuring data communication with Secure Sockets Layer (SSL)70-293: MCSE Guide to Planning a Microsoft Wi10Encrypting E-mailEncrypting e-mail ensures that a message in transit cannot be read by unauthorized peopleUses the public and private keys of the recipient:Sender creates an e-mail messageE-mail software encrypts using the recipients public keyRecipients public key may be published in a directory or given to the sender via e-mail before encryptionEncrypted message is then sent to the recipientRecipients e-mail software decrypts the message using the recipients private key70-293: MCSE Guide to Planning a Microsoft Wi11Encrypting E-mail (continued)70-293: MCSE Guide to Planning a Microsoft Wi12Digital SignaturesA digital signature is a hash value that is encrypted and attached to a messageEnsures that a message has not been modified in...
View Full Document

Page1 / 50

Planning A Microsoft Windows Server 2003 Network Chapter 09...

This preview shows document pages 1 - 13. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online