click below
click below
Normal Size Small Size show me how
Chapter 6 Terms
Question | Answer |
---|---|
bridge trust model | A trust model with one CA that acts as a facilitator to interconnect all other CAs. |
Certificate Authority (CA) | A trusted third-party agency that is responsible for issuing digital certificates. |
Certificate Repository (CR) | A publicly accessible centralized directory of digital certificates that can be used to view the status of a digital certificate. |
Certificate Revocation List (CRL) | A repository that lists revoked digital certificates. |
Certificate Signing Request (CSR) | A specially formatted encrypted message that validates the information the CA requires to issue a digital certificate. |
cipher suite | A named combination of the encryption, authentication, and message authentication code (MAC) algorithms that are used with SSL and TLS. |
digital certificate | A technology used to associate a user's identity to a public key, in which the user's public key is digitally signed by a trusted third party. |
direct trust | A type of trust model in which a relationship exists between two individuals because one person knows the other person. |
hierarchical trust model | A trust model that has a single hierarchy with one master CA. |
HTTPS | A secure version of HTTP sent over SSL or TLS. |
Internet Protocol Security (IPsec) | A set of protocols developed to support the secure exchange of packets between hosts and networks. |
key escrow | A process in which keys are managed by a third party, such as a trusted CA. |
key recovery agent (KRA) | A highly trusted person responsible for recovering lost or damaged digital certificates. |
Online Certificate Status Protocol (OCSP) | A protocol that performs a real-time lookup of a certificate's status. |
public key infrastructure (PKI) | A framework for managing all of the entities involved in creating, storing, distributing, and revoking digital certificates. |
Registration Authority (RA) | A subordinate entity designed to handle specific CA tasks such a s processing certificate requests and authenticating users. |
Secure Shell (SSH) | A Linux/UNIX-based command interface and protocol for securely accessing a remote computer. |
Secure Sockets Layer (SSL) | A protocol originally developed by Netscape for securely transmitting data. |
session keys | Symmetric keys to encrypt and decrypt information exchanged during a handshake session between a web browser and web server. |
third-party trust | A trust model in which two individuals trust each other because each individually trusts a third party. |
Transport Layer Security (TLS) | A protocol that is more secure than SSL and guarantees privacy and data integrity between applications. |
trust model | the type of trust relationship that can exist between individuals or entities. |