Relacionar Columnas Security+ 601: Cryptography - Part 1Versión en línea Match the terms and defintions; Part 1 focus more on practical definitions por Name Here Name 1 CRL (Certificate revocation list) 2 CA (Certificate authority) 3 Key Escrow 4 Trust Model 5 PKCS (Public Key Cryptography Standards) 6 Certificate Pinning 7 Digital signature 8 Cryptographic attack/cryptanalysis 9 Certificate Stapling 10 P12 11 P7B 12 Certificate Chaining 13 PKI (Public Key Infrastructure) The collection of rules that inform application on how to solve the legitimacy of a Digital Certificate; Direct, 3rd-Party, Hierarchical, Distributed Associates certificate against known copy Checks regularly for certificate invalidity Public key sender verified to own corresponding private key; provides a mechanism for verifying origin authentication, integrity, and non-repudiation A trusted entity that issues Secure Sockets Layer (SSL) certificates A file extension used for storing private keys with a certificate; can chain certificates A file extension for a certificate for public key sharing; Most commonly used on the Tomcat; Does not have private key A set of protocols that facilitate the use of public key infrastructure in data exchange Top-down CA trust model; Any certificate that is between the device that you're connecting to and the root CA Finding weaknesses in the cryptosystem Third party safeguarding private keys The set of technology and processes required to create, manage, distribute, use, store, and revoke digital certs and public-keys A type of blocklist that includes certificates that should no longer be trusted; verified with web browsers