Objective 3.9 - PKI

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/31

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

32 Terms

1
New cards

Key Management (PKI)

Within PKI refers to all the steps taken to manage public and private keys used within the PKI. This includes keeping private keys private, distributing public keys in certificates, and revoking certificates when keys are compromised

2
New cards

Certificate Authority (CA)

A trusted third-party agency that is responsible for issuing digital certificates.

3
New cards

Intermediate CA

Subordinate organizations or entities to which CAs delegate the day-to-day issuance of certificates on behalf of the CA.

4
New cards

Registration Authority (RA)

A subordinate entity designed to handle specific CA tasks such as processing certificate requests and authenticating users.

5
New cards

Certificate Revocation List (CRL)

An online list of digital certificates that the certificate authority has revoked

6
New cards

Certificate attributes

Fields in an X.509 digital certificate that are used when parties negotiate a secure connection.

7
New cards

Online Certificate Status Protocol (OCSP)

A protocol that allows you to determine the revocation status of a digital certificate using its serial number

8
New cards

Certificate Signing Request (CSR)

A specially formatted encrypted message that validates the information the CA requires to issue a digital certificate.

9
New cards

Common Name (CN)

An X500 attribute expressing a host or user name, also used as the subject identifier for a digital certificate.

10
New cards

Subject Alternative Name (SAN)

Allows a certificate owner to specify additional domains and IP addresses to be supported

11
New cards

wildcard certificate

A certificate that can be used for multiple domains with the same root domain. It starts with an asterisk.

12
New cards

Subject Alternative Name Certificate

Used for multiple domains that have different names but are owned by the same organization. For example, Google uses SANS of .google.com, .android.com, *.cloud.google.com, and more. It is often used for systems with the same based domain name but a different top level domain, for instance google.com and google.net.

13
New cards

Code Signing Certificate

Digital certificate issued (typically by a trusted CA.

Used for downloaded code, macros, object, etc.

14
New cards

self-signed certificate

A digital certificate that has been signed by the entity that issued it, rather than by a CA.

15
New cards

Machine/Computer Certificate

Used to authenticate a machine/computer into an Active Directory (AD) environment.

16
New cards

Email Certificate

A type of certificate that is used to encrypt email and digitally sign email.

17
New cards

User Certificate

A credential issued by the Authentication Service that supplies valid authentication credentials. Whenever the client requires access to a new network resource, it must prevent its TGT to the Key Distribution Center

18
New cards

root certificate

the first certificate created by the CA that identifies it

19
New cards

Domain Validation Certificate

Server security certificate that provides the lowest level of validation available.

Owner of the certificate has some control over a DNS domain.

20
New cards

Extended Validation Certificate

Increased security over domain validation certificates due to an enhanced validation process, which requires human validation ("high-assurance")

21
New cards

Distinguished Encoding Rules (DER)

Restricted version of the BER which allows one encoding type and has more restrictive rules for length, character strings, and how elements of a digital certificate are stored in X.509

22
New cards

Privacy Enhanced Mail (PEM)

A standard proposed by the Internet Engineering Task Force (IETF) that uses 3DES symmetric key encryption and RSA for key exchanges and digital signatures.

23
New cards

Personal Information Exchange (PFX)

An X.509 file format that is the preferred file format for creating certificates to authenticate applications or websites.

24
New cards

Canonical Encoding Rules (CER)

A base format for PKI certificates. They are binary encoded files.

25
New cards

P12

A common format for PKI certificates. They are CER-based (binary) and often hold certificates with the private key. They are commonly encrypted.

26
New cards

P7B

A common format for PKI certificates. They are DER-based (ASCII) and commonly used to share public keys.

27
New cards

Online vs. Offline CA

Online: An internal online CA is always up and running so that people in the company can request a certificate at any time of the day or night. This would NOT be the case in a government or top-security environment

Offline: An offline CA is for a military or secure environment where clearance and vetting must be completed before someone can be issues with a certificate. The CA is kept offline and locked up when it is not being used. It is switched off so that it cannot issue new certificates

28
New cards

Stapling

The certificate presenter (such as a web server) obtains a timestamped OCSP response from the CA. Before sending it, the CA signs it with a digital signature. The certificate presenter then appends a timestamped OCSP response to the certificate during the TLS handshake process.

29
New cards

Pinning

A security mechanism used by some web sites to prevent web site impersonation. Web sites provide clients with a list of public key hashes. Clients store the list and use it to validate the web site.

30
New cards

Trust Model

The use of a trusted third party to verify the trustworthiness of a digital certificate.

31
New cards

key escrow

a control procedure whereby a trusted party is given a copy of a key used to encrypt database data

32
New cards

Certificate chaining

A process that combines all certificates within a trust model. It includes all the certificates in the trust chain from the root CA down to the certificate issued to the end user.