Public key infrastructure
In this section, students will address each of the following.
Define the public key infrastructure (PKI) requirements, propose a solution, and justify
the solution.
Students should be specific when discussing the implementation and
configuration required for the PKI solution.
Define the secure protocol implementation requirements, propose a solution, and
justify the solution.
Students should consider data as it is in transit and discuss the numerous
scenarios and solutions to protect it.
Define the file encryption requirements, propose a solution, and justify the solution.
Students should consider data at rest and discuss the numerous scenarios and
solutions to protect it.
Define the file hashing implementation, propose a solution, and justify the solution.
Students should consider where hashing should be implemented in the network
design and explain what it provides in each instance.
Define the backup and restoration implementation, propose a solution, and justify the
solution.
Students should explain the process, where it is applicable in the UMUC network
scenario, and how it will be achieved (process, hardware, and frequency).
Solution preview for the order on public key infrastructure
APA
1676 words