click below
click below
Normal Size Small Size show me how
CIT292 Chapter 13
CIT292 Network Security - Terms for Chapter 13
| Term | Definition |
|---|---|
| Public Key Infrastructure | an entire system of hardware and software, policies, procedures, people, used to create, distribute, manage, store, and revoke digital certificates |
| Certificates | Digitally signed electronic documents that bind a public key with a user identity |
| Certificate authority | The entity (usually a server) that issues digital certificates to users |
| One-to-one mapping | Individual certificate is mapped to single recipient |
| Many – to-one mapping | Multiple certificates are mapped to one recipient |
| Certificate revocation list | CRL A list of certificates no longer valid or that have been revoked by the issuer |
| X.509 | Common PKI standard developed by ITU-T that incorporates the single sign-on authentication method |
| Key escrow | When certificate keys are held in case third parties, such as government or other organizations, need access to encrypted communications |
| Web of trust | A decentralized model used for sharing certificates without the need for a centralized CA |
| S/MIME | IETF standard that provides cryptographic security for electronic messaging such as email |
| Secure Sockets Layer | A cryptographic protocol that provides secure Internet communications such as web browsing, email, and VOIP |
| Transport Layer Security | The successor to SSL. Provides secure Internet communications. Shown in browser as HTTPS |
| Secure Shell | A protocol that can create a secure channel between two computers or network devices |
| Point-to-Point Tunneling Protocol | A tunneling protocol used to support VPNs. Includes security mechanisms, and no additional software or protocols are needed. Uses port 1723. |
| Layer 2 Tunneling Protocol | A tunneling protocol used to connect virtual private networks. It does not include the confidentiality or encryption on its own. Uses port 1701 and more secure if used with IPSec. |
| Internet Protocol Security | TCP/IP protocol that authenticates and encrypts IP packets, effectively securing communications between computers and devices using the protocol |