0% found this document useful (0 votes)
37 views

ISE 620 Module Three Lab Act

ise 620

Uploaded by

peakeduc
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
37 views

ISE 620 Module Three Lab Act

ise 620

Uploaded by

peakeduc
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 2

name

ISE-620
Southern New Hampshire University
3/13/2024

Lab Procedure: Creating a public key encryption certificate for sending secure file attachments

Tasks:

1. Click on the internal Windows 10 icon on the topology. Then, double-click on the shortcut to Kleopatra on the desktop.
2. From the Kleopatra menu, select File and then New Certificate.
3. Click Create a personal Open PGP key pair.
4. For the name, type student. For the email, type [email protected]. Click Next.
5. At the Certificate Creation Wizard screen, click Create Key.
6. At the pin entry screen, type student for the Password and click OK.
7. At the pinentry-qt4 screen, click Take this one anyway.
8. At the pin entry screen, re-enter the student’s password.
9. Click Finish to close the Certificate Creation Wizard.
10. On the Kleopatra screen, click the student certificate and click Export Certificates.
11. Click the drop-down arrow to the right of student and select Desktop.
12. In the File Name box, type student.asc. Click the Save button.
13. At the Kleopatra screen, click the X in the right-hand corner to close the screen.
14. Double-click on the shortcut to Opera Mail on the desktop.
15. Click the Compose button, which is located on the left side of Opera Mail.
16. Address: [email protected]. In the subject box, type My Public Key. In the body, type here is my Public Key. Click the paper clip to
attach a file.
Mapping Table
Key Task Key Task Purpose
Number
1, 2,3, 5, 7, 10, Ensure that you have the ability to package a public key in a usable format so that someone else can decrypt an
11, 12, 15, 16 enciphered file attachment that you send to them.
3,5,15 Select an encryption type that supports your need for private communications between a sender and recipient
14, 15, 16 Transmit your public key to a recipient that you want to securely communicate with
4, 6, 8, 12 Associate your name with an encryption key pair

Value: As a practitioner, the tasks are significant because they are essential in the process of establishing secured communication .I can be
rest assured that my messages and attachments are encrypted and can only be decrypted by the intended receiver. This process is necessary to
block out unauthorized access to sensitive information and maintain the confidentiality of our communications.

Additionally, the procedure would help to protect data from being modified or tampered with by an intruder, this would ensure integrity. It
would also boost trust and lead to the authenticity of messages and not allow any third party to manipulate or forge my messages. It can be
helpful and useful among an incident response team by allowing exchange of information without fear of messages being leaked to attackers.
It would also help to quickly gather information to know the root cause of the incident

You might also like