Certificates - CompTIA Security+ SY0-701-1.4

0.0(0)
Studied by 0 people
call kaiCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/11

encourage image

There's no tags or description

Looks like no tags are added yet.

Last updated 5:11 AM on 3/26/26
Name
Mastery
Learn
Test
Matching
Spaced
Call with Kai

No analytics yet

Send a link to your students to track their progress

12 Terms

1
New cards

Digital Certificate

Binds a public key with a digital signature

A digital signature adds trust

- PKI uses certificate authorities for additional trust

- Web of Trust adds other users for additional trust

Certificate creation can be built into the OS

- Part of Windows Domain services

- Many 3rd party options

2
New cards

What's in a digital certificate?

- X.509 (standard format)

- certificate details (serial number, version, signature algorithm, issuer, name of the cert holder, public key, extensions)

3
New cards

Root of Trust

Everything associated with IT security requires trust.

How to build trust from something unknown

- 3rd party trust

Often known as root of trust

- Inherently trusted component

- Hardware, software, firmware or other components

- Hardware security module (HSM), Secure Enclave, Certificate Authority

4
New cards

Certificate Authority (CA)

You connect to a random website

Need a good way to trust unknown entitity

Certificate Authority (CA) has digitally signed the website certificate

- You trust the CA, therefore you trust the site

- Real time verification

5
New cards

Third-party certificate authorities

• Built-in to your browser

- Any browser

• Purchase your web site certificate

- It will be trusted by everyone's browser

• CA is responsible for vetting the request

- They will confirm the certificate owner

- Additional verification information may be

required by the CA

6
New cards

Certificate signing requests

• Create a key pair, then send the public key to

the CA to be signed

- A certificate signing request (CSR)

• The CA validates the request

- Confirms DNS emails and website ownership

• CA digitally signs the cert

- Returns to the applicant

7
New cards

Private certificate authorities

You are your own CA

- Build it in-house

- Your devices must trust the internal CA

Needed for medium-to-large organizations

-Many web-servers and privacy requirements

Implement as part of your overall computing strategy

- Windows Certificate Services, OpenCA

8
New cards

Self-Signed Certificates

Internal certificates don't need to be signed by a public CA

- Your company is the only one going to use it

- No need to purchase trust for devices that already trust you

Build your own CA

- Issue your own certificates signed by your own CA

Install the CA certificate/trusted chain on all devices

- They'll now trust any certifications by your internal CA

- Work exactly like a certificate you purchased

9
New cards

Wildcard Certificates

• Subject Alternative Name (SAN)

- Extension to an X.509 certificate

- Lists additional identification information

- Allows a certificate to support many different domains

• Wildcard domain

- Certificates are based on the name of the server

- A wildcard domain will apply to all server names

in a domain

- *.professormesser.com

10
New cards

Key Revocation

• Certificate Revocation List (CRL)

- Maintained by the Certificate Authority (CA)

• Many different reasons

- Changes all the time

• April 2014 - CVE-2014-0160

- Heartbleed

- OpenSSL flaw put the private key of affected

web servers at risk

- OpenSSL was patched, every web server

certificate was replaced

- Older certificates were moved to the CRL

11
New cards

OCSP stapling

Online Certificate Status Protocol

The CA is responsible for responding to all client OCSP requests

- This may not scale well

Instead, have the certificate holder verify their own status

- Status information is stored on the certificate holder's server

The use of OCSP requires communication between the client and the CA that issued a certificate.

OCSP is being stapled in the SSL/TLS handshake

- Digitally signed by the CA

12
New cards

Getting revocation details to the browser

• OCSP (Online Certificate Status Protocol)

- The browser can check certificate revocation

• Messages usually sent to an OCSP responder via HTTP

- Easy to support over Internet links

• Not all browsers/apps support OCSP

- Early Internet Explorer versions did not

support OCSP

- Some support OCSP, but don't bother checking

Explore top notes

note
Key Stuff - All Ideologies
Updated 1017d ago
0.0(0)
note
Aniline differentiation
Updated 351d ago
0.0(0)
note
Chapter 27 - The Cold War
Updated 1441d ago
0.0(0)
note
CGO casus 4
Updated 434d ago
0.0(0)
note
Key Stuff - All Ideologies
Updated 1017d ago
0.0(0)
note
Aniline differentiation
Updated 351d ago
0.0(0)
note
Chapter 27 - The Cold War
Updated 1441d ago
0.0(0)
note
CGO casus 4
Updated 434d ago
0.0(0)

Explore top flashcards

flashcards
Unit 6 Gradesavers Kaji
47
Updated 1102d ago
0.0(0)
flashcards
patho chapter 5
31
Updated 1136d ago
0.0(0)
flashcards
Vocabulary Power Unit 3
42
Updated 414d ago
0.0(0)
flashcards
APUSH Unit 5
111
Updated 1176d ago
0.0(0)
flashcards
english final
53
Updated 104d ago
0.0(0)
flashcards
TUTTO PARZIALE 2
169
Updated 464d ago
0.0(0)
flashcards
troika chapter 4
68
Updated 1119d ago
0.0(0)
flashcards
Unit 6 Gradesavers Kaji
47
Updated 1102d ago
0.0(0)
flashcards
patho chapter 5
31
Updated 1136d ago
0.0(0)
flashcards
Vocabulary Power Unit 3
42
Updated 414d ago
0.0(0)
flashcards
APUSH Unit 5
111
Updated 1176d ago
0.0(0)
flashcards
english final
53
Updated 104d ago
0.0(0)
flashcards
TUTTO PARZIALE 2
169
Updated 464d ago
0.0(0)
flashcards
troika chapter 4
68
Updated 1119d ago
0.0(0)