Relacionar Columnas Security+ 601: Cryptography - Part 1Versión en línea Match the terms and defintions; Part 1 focus more on practical definitions por Name Here Name 1 P12 2 Cryptographic attack/cryptanalysis 3 Trust Model 4 CA (Certificate authority) 5 Certificate Chaining 6 Certificate Stapling 7 PKI (Public Key Infrastructure) 8 Key Escrow 9 Certificate Pinning 10 Digital signature 11 P7B 12 PKCS (Public Key Cryptography Standards) 13 CRL (Certificate revocation list) The collection of rules that inform application on how to solve the legitimacy of a Digital Certificate; Direct, 3rd-Party, Hierarchical, Distributed Third party safeguarding private keys A file extension for a certificate for public key sharing; Most commonly used on the Tomcat; Does not have private key A file extension used for storing private keys with a certificate; can chain certificates Associates certificate against known copy Checks regularly for certificate invalidity The set of technology and processes required to create, manage, distribute, use, store, and revoke digital certs and public-keys A type of blocklist that includes certificates that should no longer be trusted; verified with web browsers Finding weaknesses in the cryptosystem Public key sender verified to own corresponding private key; provides a mechanism for verifying origin authentication, integrity, and non-repudiation A trusted entity that issues Secure Sockets Layer (SSL) certificates Top-down CA trust model; Any certificate that is between the device that you're connecting to and the root CA A set of protocols that facilitate the use of public key infrastructure in data exchange