Skip to main content

PUBLIC KEY INFRASTRUCTURE


PUBLIC KEY INFRASTRUCTURE

A public key infrastructure (PKI) supports the
·       Distribution and identification of public encryption keys
·       Enables users and computers to exchange data over networks  
·       Verify the identity of the other party
·       Enables people and businesses to utilize a number of secure Internet applications. For example, secure and legally binding emails and Internet based transactions, and services delivery can all be achieved through the use of PKI

Key Elements of PKI:-
  • A trusted party(certificate authority (CA))- act as a root of trust and provides services that authenticate the identity of individuals, computers and other entities
  • A registration authority(subordinate CA)- certified by a root CA to issue certificates for specific uses permitted by the root
  • A certificate database- stores certificate requests and issues certificates
  • A certificate store- resides on a local computer to store issued certificates and private keys

Security Features of PKI:-

Authentication
Authentication becomes crucial when an organization opens its door to the internet to verify the identity of users and machines. PKI provides strong authentication mechanisms to ensure that persons and machines are the entities they claim to be.
Encryption
PKI uses encryption algorithms to secure communications and ensure the privacy of data sent from one computer to another.
Non-repudiation
PKI can be used to provide non-repudiation through digital signatures. This proves that a specific user performed certain operations at a given time.

Advantages of the PKI Approach:-

  • PKI is a standards-based technology.
  • It allows the choice of trust provider.
  • It is highly scalable. User can maintain their own certificate and certificate authentication involves exchange of data between client and server only.
  • PKI allows delegated trust. Users having certificate from a recognized and trusted certificate authority can authenticate themselves to a server the very first time they connect to that server without having previously been registered with the system

Disadvantages of the PKI Approach:-

  • We need a thorough understanding of PKI and asymmetric encryption principles to set this up.
  • Asymmetric encryption is slow so PKI is only used on short messages.

Comments

Popular posts from this blog

Advantages and Disadvantages of EIS Advantages of EIS Easy for upper-level executives to use, extensive computer experience is not required in operations Provides timely delivery of company summary information Information that is provided is better understood Filters data for management Improves to tracking information Offers efficiency to decision makers Disadvantages of EIS System dependent Limited functionality, by design Information overload for some managers Benefits hard to quantify High implementation costs System may become slow, large, and hard to manage Need good internal processes for data management May lead to less reliable and less secure data

Inter-Organizational Value Chain

The value chain of   a company is part of over all value chain. The over all competitive advantage of an organization is not just dependent on the quality and efficiency of the company and quality of products but also upon the that of its suppliers and wholesalers and retailers it may use. The analysis of overall supply chain is called the value system. Different parts of the value chain 1.  Supplier     2.  Firm       3.   Channel 4 .   Buyer

CONCEPTUAL VIEW OF MIS

The concept is a blend of principles, theories and practices of management, information and system giving rise to a single product called MANAGEMENT INFORMATION SYSTEM . The concept of management gives high regard to the individual and his ability to use the information. MIS gives information through data analysis. While analyzing the information, it relies on many academic disciplines like management science, OR, organization behavior, psychology, etc. The foundation of MIS is the principles of management and its practices. MIS uses the concept of management control in its design and relies heavily on the fact that the decision maker is a human being and is a human processor of information. A MIS can be evolved for a specific objective it is evolved after systematic planning and design. It calls for an analysis of business, management views and policies, organization culture and the management style. The MIS,therefore relies heavily on systems theory.The systems theory offers soluti