Relacionar Columnas Security+ 601: Cryptography - Part 1Versión en línea Match the terms and defintions; Part 1 focus more on practical definitions por Name Here Name 1 Trust Model 2 Key Escrow 3 Digital signature 4 P12 5 PKCS (Public Key Cryptography Standards) 6 CA (Certificate authority) 7 Cryptographic attack/cryptanalysis 8 Certificate Chaining 9 P7B 10 PKI (Public Key Infrastructure) 11 CRL (Certificate revocation list) 12 Certificate Pinning 13 Certificate Stapling Finding weaknesses in the cryptosystem A set of protocols that facilitate the use of public key infrastructure in data exchange A file extension for a certificate for public key sharing; Most commonly used on the Tomcat; Does not have private key Checks regularly for certificate invalidity Third party safeguarding private keys A trusted entity that issues Secure Sockets Layer (SSL) certificates Top-down CA trust model; Any certificate that is between the device that you're connecting to and the root CA The collection of rules that inform application on how to solve the legitimacy of a Digital Certificate; Direct, 3rd-Party, Hierarchical, Distributed Public key sender verified to own corresponding private key; provides a mechanism for verifying origin authentication, integrity, and non-repudiation The set of technology and processes required to create, manage, distribute, use, store, and revoke digital certs and public-keys A file extension used for storing private keys with a certificate; can chain certificates A type of blocklist that includes certificates that should no longer be trusted; verified with web browsers Associates certificate against known copy