10.1 16-1-CISS-Ethical-Hacking-Training-2.0-by-www.SecAcademy.com.pdf.pdf
(
2230 KB
)
Pobierz
3
Public Key Infrastructure,
or the
”Trust
but verify”
rule and
How to deploy it
How to build
a trust relationship
Certificates
are used to verify identity
To trust a certificate,
you must trust the
certification authority that issued the
certificate
Public key
infrastructure
A public key infrastructure is made up from:
•
Certification authorities
•
Certificates issued by CAs
•
Certificate templates
•
Certificate distribution points
•
Certificate revocation list distribution points
•
And software for using and managing a PKI
Public key
infrastructure
Digital
Signatures
Encrypting
File System
CA
Root
Policy
Secure
E-mail
Smart Card
Logon
Internet
Authentication
S/MIME
Software
Restriction Policy
802.1x
EFS
RAS
Software
Code Signing
IP Sec
Public key
infrastructure
Deploying a PKI in Windows will allow you to:
•
Encrypt stored data using EFS
•
Implement strong user authentication with the help of smart cards and the expanded version five of
Kerberos
•
Authenticate users and networked devices (both in wired and wireless networks) using the 802.1X
standard
•
Encrypt and digitally signed email messages using S/MIME
•
Digitally sign programs
•
Encrypt and digitally sign transmitted data using IPSec
•
Verify the identity of web servers and guarantee the confidentiality and integrity of data transmitted across
the servers and their clients, using SSL/TLS
•
Enforce health policy compliance for networked devices, using NAP
•
Use software restriction policies to block programs based on their manufacturer certificates
A public key infrastructure is a complex and fully functional but easy-to-deploy cryptography
system
Plik z chomika:
art.w
Inne pliki z tego folderu:
1. Introduction to cryptology.mp4
(6121 KB)
1. Introduction to cryptology.vtt
(2 KB)
10. Public Key Infrastructure - Trust but verify - notes for the examination.html
(0 KB)
10.1 16-1-CISS-Ethical-Hacking-Training-2.0-by-www.SecAcademy.com.pdf.pdf
(2230 KB)
2. Public key infrastructure.mp4
(15157 KB)
Inne foldery tego chomika:
1. IT Security Trends
10. Risk Management
11. Defence in Depth
12. Disaster Recovery
13. Application Security
Zgłoś jeśli
naruszono regulamin