Category: Networking

0

CISCO PRODUCTS AND SERVICES DO REQUIRE A CERTIFICATION AND EXAM PASS

Normal 0 false false false EN-US X-NONE X-NONE DefSemiHidden=”true” DefQFormat=”false” DefPriority=”99″ LatentStyleCount=”267″> UnhideWhenUsed=”false” QFormat=”true” Name=”Normal”/> UnhideWhenUsed=”false” QFormat=”true” Name=”heading 1″/> UnhideWhenUsed=”false”…

0

2015 a brand new year

Happy New Year Everyone, It has been quite some time since my last post here on my blog. The last time I posted anything was back in August of 2014. That was approximately 6 months ago. Many things have gone on since then. I was very busy. Between work and school, I did not have that much time to post anything. Now that the New Year has passed, I will try to do my best to update this blog regularly. In current news, I am 6 weeks into the January session in school. I am taking classes for Linux Administration...

0

Data Security and PKI

Data security is very important. Keeping sensitive data secure is essential to protecting a company’s proprietary data from rival companies or from hackers. The best way to keep data secure is to implement data encryption using a public key infrastructure system. By utilizing PKI standards in addition to utilizing proper security policies and procedures, data integrity can be kept while minimizing possible data breeches (Wikipedia, 2014). PKI utilizes two different types of keys. The key types are Asymmetric and Symmetric. Both key types are used to help validate users against and establish a trust between the certificate authority and the end...