O'Reilly logo

Security+ Training Guide by Todd King

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter Summary

In this chapter, we examined the concept of the public key infrastructure and the functions it enables. We began the chapter with a discussion of the digital certificate and the policies and procedures required to support it. We then looked at the concept of trust and how it relates to PKI in the form of trust models. We also talked about one of the most challenging portions of a PKI operation: cross certification.

KEY TERMS

  • Attribute certificate

  • Authenticated header (AH)

  • CA bridges

  • Centralized key management

  • Certificate Enrollment Protocol (CEP)

  • Certificate Management Protocol (CMP)

  • Certificate practice statement

  • Certificate policy

  • Certificate revocation

  • Certificate revocation list

  • Certificate suspension

  • Cross certification

  • Cryptographic ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required