O'Reilly logo

TICSA TruSecure™ ICSA Certified Security Associate Exam TU0-001 by Shawn Porter, Debra Littlejohn Shinder, Mike Chapple

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Explain, Identify, or Recognize Basic Uses, Requirements, and Functions of PKI and Digital Certificates

Digital Certificates

Public key encryption is more secure than secret key encryption, but also more difficult to manage on a large scale. If public keys are posted to the Internet without any oversight, someone could provide a public key that purports to be that of another user. Then, data encrypted with that key and intended for the user whose name was associated with it could be intercepted and accessed by the unauthorized user who posted the key with the fraudulent information. To verify a user's or computer's identity, we need a mechanism for a trusted third party to confirm that the user or computer advertising the public key is in fact ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required