Introduction to PKI
Explain, identify, or recognize basic uses, requirements and functions of PKI and digital certificates:
Define the function of a PKI.
Throughout this book, we discuss many different security mechanisms: physical security, hardware-based security, software solutions, and protecting against operating system, application, and protocol exploits. You've learned about authentication, access control, encryption technologies, and the role of security policies.
An important point that should be apparent by now is that no single security mechanism, regardless of how highly recommended it comes (or how high its price), can provide complete protection for an organization's computers and network. Effective security is based on the multilayered ...
Get TICSA TruSecure™ ICSA Certified Security Associate Exam TU0-001 now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.