Term | Definition |
bridge trust model | a trust model with one CA that acts as a facilitator to interconnect all other CAs |
Certificate Authority | a trusted third-party agency that is responsible for issuing digital certificates |
Certificate Repository | a publicly accessible centralized directory of digital certificates that can be used to view the status of a digital certificate |
Certificate Revocation List | a list of revoked digital certificates |
Certificate Signing Request | a specifically formatted encrypted message that validates the info the CA requires to issue a digital certificate |
cipher suite | a named combination of the encryption, authentication, and message authentication code (MAC) algorithms that are used with SSL and TLS |
digital certificate | a technology that associates a user's identity with a public key that is signed by a third party |
direct trust | a type of trust model where a relationship exists between two individuals because one person knows the other person |
distributed trust model | a trust model that has multiple CAs that sign digital certificates |
hierarchical trust model | a trust model that has a single hierarchy with one master CA |
hypertext transport protocol secure | a secure version of HTTP sent over ssl or tls |
internet protocol security | A set of protocols developed to support the secure exchange of packes between hosts and networks |
key escrow | a process in which keys are managed by a third party, such as a trusted CA |
key recovery agent | a highly trusted person responsible for recovering lost or damaged digital certificates |
online certificate status protocol | a protocol that performs a real-time lookup of a certificate's status |
public key infrastructure | a framework for managing all of the entities involved in creating, sorting, distributing, and revoking digital certificates |
registration authority | a subordinate entity designed to handle specific CA tasks such as processing certificate requests and authenticating users |
secure shell | a Linux/UNIX-based command interface and protocol for securely accessing a remote computer |
secure sockets layer | a protocol originally developed by Netscape for securely transmitting data |
session keys | Symmetric keys to encrypt and decrypt data exchanged during a handshake session between a web browser and webserver |
third-party trust | a trust model in which two individuals trust each other because each individually trusts a third [arty |
transport layer security | a protocol that is more secure than SSL and guarantees privacy and data integrety between aplications |
trust model | a type of trust relationship that can exist between individuals or entities |