click below
click below
Normal Size Small Size show me how
CIT292 Chapter 13
CIT292 Network Security - Terms for Chapter 13
Term | Definition |
---|---|
Public Key Infrastructure | an entire system of hardware and software, policies, procedures, people, used to create, distribute, manage, store, and revoke digital certificates |
Certificates | Digitally signed electronic documents that bind a public key with a user identity |
Certificate authority | The entity (usually a server) that issues digital certificates to users |
One-to-one mapping | Individual certificate is mapped to single recipient |
Many – to-one mapping | Multiple certificates are mapped to one recipient |
Certificate revocation list | CRL A list of certificates no longer valid or that have been revoked by the issuer |
X.509 | Common PKI standard developed by ITU-T that incorporates the single sign-on authentication method |
Key escrow | When certificate keys are held in case third parties, such as government or other organizations, need access to encrypted communications |
Web of trust | A decentralized model used for sharing certificates without the need for a centralized CA |
S/MIME | IETF standard that provides cryptographic security for electronic messaging such as email |
Secure Sockets Layer | A cryptographic protocol that provides secure Internet communications such as web browsing, email, and VOIP |
Transport Layer Security | The successor to SSL. Provides secure Internet communications. Shown in browser as HTTPS |
Secure Shell | A protocol that can create a secure channel between two computers or network devices |
Point-to-Point Tunneling Protocol | A tunneling protocol used to support VPNs. Includes security mechanisms, and no additional software or protocols are needed. Uses port 1723. |
Layer 2 Tunneling Protocol | A tunneling protocol used to connect virtual private networks. It does not include the confidentiality or encryption on its own. Uses port 1701 and more secure if used with IPSec. |
Internet Protocol Security | TCP/IP protocol that authenticates and encrypts IP packets, effectively securing communications between computers and devices using the protocol |