Jumpstart Your Paper

Browse our Free Essay examples and check out our Writing tools to get your assignments done.

Elements of Cryptography

INSTRUCTIONS:

As a future information security manager you know it is important to provide for the proper verification of identity when communicating online. Research the components of public key infrastructure to include the use of private and public keys, digital certificates, certificates of authority, secure socket layer, and transport layer security methods. These methods are used to safeguard and validate the authenticity of an individual’s online identity when communicating across a network.
Related Topics: