Choosing Security Solutions That Use Public Key Technology

Designing an appropriate security system to protect your organization's confidential and proprietary information requires developing a set of appropriate solutions for specific risk scenarios. Many of the distributed security features that are available in the Microsoft® Windows® 2000 operating system to provide strong and scalable solutions for network security use public key technology. Understanding public key technology and the Windows 2000 network and information security options can help you use them effectively.

In This Chapter

Weaknesses in Open Network Security

Windows 2000 Security Technologies

Network Security Solutions

Public Key Technology Standards and Interoperability

How to Choose Appropriate Security Solutions

  • For more information about the basic concepts of cryptography and public key technology as well as the implications of cryptography export restrictions, see "Cryptography for Network and Information Security" in this book.

  • For more information about the Windows 2000 public key infrastructure and Certificate Services, see "Windows 2000 Certificate Services and Public Key Infrastructure" in this book.

  • For more information about designing, testing, and deploying a public key infrastructure, see "Planning Your Public Key Infrastructure" in the Microsoft ® Windows ®  2000 Server Resource Kit Deployment Planning Guide .