10.1 16-1-CISS-Ethical-Hacking-Training-2.0-by-www.SecAcademy.com.pdf.pdf

(2230 KB) Pobierz
3
Public Key Infrastructure,
or the
”Trust
but verify”
rule and
How to deploy it
How to build
a trust relationship
Certificates
are used to verify identity
To trust a certificate,
you must trust the
certification authority that issued the
certificate
Public key
infrastructure
A public key infrastructure is made up from:
Certification authorities
Certificates issued by CAs
Certificate templates
Certificate distribution points
Certificate revocation list distribution points
And software for using and managing a PKI
Public key
infrastructure
Digital
Signatures
Encrypting
File System
CA
Root
Policy
Secure
E-mail
Smart Card
Logon
Internet
Authentication
S/MIME
Software
Restriction Policy
802.1x
EFS
RAS
Software
Code Signing
IP Sec
Public key
infrastructure
Deploying a PKI in Windows will allow you to:
Encrypt stored data using EFS
Implement strong user authentication with the help of smart cards and the expanded version five of
Kerberos
Authenticate users and networked devices (both in wired and wireless networks) using the 802.1X
standard
Encrypt and digitally signed email messages using S/MIME
Digitally sign programs
Encrypt and digitally sign transmitted data using IPSec
Verify the identity of web servers and guarantee the confidentiality and integrity of data transmitted across
the servers and their clients, using SSL/TLS
Enforce health policy compliance for networked devices, using NAP
Use software restriction policies to block programs based on their manufacturer certificates
A public key infrastructure is a complex and fully functional but easy-to-deploy cryptography
system
Zgłoś jeśli naruszono regulamin