Choosing Security Solutions That Use Public Key Technology
Designing an appropriate security system to protect your organization's confidential and proprietary information requires developing a set of appropriate solutions for specific risk scenarios. Many of the distributed security features that are available in the Microsoft® Windows® 2000 operating system to provide strong and scalable solutions for network security use public key technology. Understanding public key technology and the Windows 2000 network and information security options can help you use them effectively.
In This Chapter
Weaknesses in Open Network Security
Windows 2000 Security Technologies
Public Key Technology Standards and Interoperability
How to Choose Appropriate Security Solutions
Related Information in the Resource Kit
For more information about the basic concepts of cryptography and public key technology as well as the implications of cryptography export restrictions, see "Cryptography for Network and Information Security" in this book.
For more information about the Windows 2000 public key infrastructure and Certificate Services, see "Windows 2000 Certificate Services and Public Key Infrastructure" in this book.
For more information about designing, testing, and deploying a public key infrastructure, see "Planning Your Public Key Infrastructure" in the Microsoft ® Windows ® 2000 Server Resource Kit Deployment Planning Guide .