Compare and contrast the hierarchical trust model peer-to-peer trust model and hybrid trust model used in creating a CA
Question 1
Compare and contrast the hierarchical trust model, peer-to-peer trust model, and hybrid trust model used in creating a CA. (Your response should be at least 300 words in length. You are required to use at least your textbook as source material for your response. All sources used, including the textbook, must be referenced; paraphrased and quoted material must have accompanying citations.)
Question 2
Explain in your own words how, by applying both asymmetric and symmetric encryption, your browser uses SSL to protect the privacy of the information passing between your browser and a web server. (Your response should be at least 300 words in length. You are required to use at least your textbook as source material for your response. All sources used, including the textbook, must be referenced; paraphrased and quoted material must have accompanying citations.)
Instructions
- Use our textbook as the primary source to answer EACH question, other books are welcome but not required. If you don’t have the exact same book then don’t even start writing. The main textbook MUST be cited when answering ALL questions: Conklin, W. A., White, G., Williams, D., Davis, R., Cothren, C., & Schou, C. (2011). Principles of computer security
- compTIA security+ and beyond (3rd ed.). New York, NY: McGraw Hill.
- Chapters to use
Chapter 5: Cryptography
Chapter 6: Public Key Infrastructure
Chapter 7: Standards and Protocols
- Answer questions in the same order as the outline provided on the attachment. Treat them as mini essays. If there are 2 questions I need 2
answers. - Unless otherwise indicated, there is a 300 word minimum response required per question.
- All sources used, including the textbook, must be referenced; paraphrased and quoted material must have accompanying citations.
- NOT REQUIRED: title page, margins, header, double spacing, and hanging indentation
Answer preview for Compare and contrast the hierarchical trust model peer-to-peer trust model and hybrid trust model used in creating a CA
Access the full answer containing 930 words by clicking the below purchase button