Explain, identify, or recognize basic uses, requirements and functions of PKI and digital certificates:
Define the function of a PKI.
Throughout this book, we discuss many different security mechanisms: physical security, hardware-based security, software solutions, and protecting against operating system, application, and protocol exploits. You've learned about authentication, access control, encryption technologies, and the role of security policies.
An important point that should be apparent by now is that no single security mechanism, regardless of how highly recommended it comes (or how high its price), can provide complete protection for an organization's computers and network. Effective security is based on the multilayered ...