click below
click below
Normal Size Small Size show me how
Chapter 6 Terms
| Question | Answer |
|---|---|
| bridge trust model | A trust model with one CA that acts as a facilitator to interconnect all other CAs. |
| Certificate Authority (CA) | A trusted third-party agency that is responsible for issuing digital certificates. |
| Certificate Repository (CR) | A publicly accessible centralized directory of digital certificates that can be used to view the status of a digital certificate. |
| Certificate Revocation List (CRL) | A repository that lists revoked digital certificates. |
| Certificate Signing Request (CSR) | A specially formatted encrypted message that validates the information the CA requires to issue a digital certificate. |
| cipher suite | A named combination of the encryption, authentication, and message authentication code (MAC) algorithms that are used with SSL and TLS. |
| digital certificate | A technology used to associate a user's identity to a public key, in which the user's public key is digitally signed by a trusted third party. |
| direct trust | A type of trust model in which a relationship exists between two individuals because one person knows the other person. |
| hierarchical trust model | A trust model that has a single hierarchy with one master CA. |
| HTTPS | A secure version of HTTP sent over SSL or TLS. |
| Internet Protocol Security (IPsec) | A set of protocols developed to support the secure exchange of packets between hosts and networks. |
| key escrow | A process in which keys are managed by a third party, such as a trusted CA. |
| key recovery agent (KRA) | A highly trusted person responsible for recovering lost or damaged digital certificates. |
| Online Certificate Status Protocol (OCSP) | A protocol that performs a real-time lookup of a certificate's status. |
| public key infrastructure (PKI) | A framework for managing all of the entities involved in creating, storing, distributing, and revoking digital certificates. |
| Registration Authority (RA) | A subordinate entity designed to handle specific CA tasks such a s processing certificate requests and authenticating users. |
| Secure Shell (SSH) | A Linux/UNIX-based command interface and protocol for securely accessing a remote computer. |
| Secure Sockets Layer (SSL) | A protocol originally developed by Netscape for securely transmitting data. |
| session keys | Symmetric keys to encrypt and decrypt information exchanged during a handshake session between a web browser and web server. |
| third-party trust | A trust model in which two individuals trust each other because each individually trusts a third party. |
| Transport Layer Security (TLS) | A protocol that is more secure than SSL and guarantees privacy and data integrity between applications. |
| trust model | the type of trust relationship that can exist between individuals or entities. |