lesson10 - Lesson10 SkillsMatrix SkillsMatrix...

Info icon This preview shows pages 1–8. Sign up to view the full content.

View Full Document Right Arrow Icon
Maintaining Network  Health Maintaining Network  Health Lesson 10
Image of page 1

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full Document Right Arrow Icon
Skills Matrix Skills Matrix Technology Skill Objective Domain Objective # Understanding the  Components of NAP Configure Network  Access Protection (NAP) 3.2
Image of page 2
Public Key Infrastructure Public Key Infrastructure Public key infrastructure (PKI) consists of  a number of elements that allow two  parties to communicate securely, without  any previous communication, through the  use of a mathematical algorithm called  public key cryptography.  Public key cryptography, as the name  implies, stores a piece of information  called a public key for each user,  computer, and so on that is participating in  a PKI.
Image of page 3

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full Document Right Arrow Icon
Public Key Infrastructure Public Key Infrastructure Each user, computer, and so on also possesses  a private key, a piece of information that is  known only to the individual user or computer.  By combining the well-known and easily  obtainable public key with the hidden and well- secured private key, one entity (you, for  example) can communicate with another entity  (a secured Web site, for example) in a secure  fashion without exchanging any sort of shared  secret key beforehand.  A shared secret key is a secret piece of  information that is shared between two parties  prior to being able to communicate securely.
Image of page 4
Certificate Authority (CA) Certificate Authority (CA) A Certificate Authority (CA) is an entity, such as  a Windows Server 2008 server running the AD  CS server role, that issues and manages digital  certificates for use in a PKI.  CAs are  hierarchical , which means that many  subordinate CAs  within an organization can chain  upwards to a single  root CA  that is authoritative  for all Certificate Services within a given network.  Many organizations use a three-tier hierarchy,  where a single root CA issues certificates to a  number of  intermediate CAs,  allowing the  intermediate CAs to issue certificates to users or  computers.
Image of page 5

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full Document Right Arrow Icon
Digital Certificate Digital Certificate Sometimes just called a  certificate. This digital document contains identifying  information about a particular user,  computer, service, and so on.  The digital certificate contains the  certificate holder’s name and public key,  the digital signature of the Certificate  Authority that issued the certificate, as well  as the certificate’s expiration date. 
Image of page 6
Digital Signature Digital Signature This electronic signature (created by a  mathematical equation) proves the identity of the  entity that has  signed  a particular document.  Like a personal signature on a paper document, 
Image of page 7

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full Document Right Arrow Icon
Image of page 8
This is the end of the preview. Sign up to access the rest of the document.

{[ snackBarMessage ]}

What students are saying

  • Left Quote Icon

    As a current student on this bumpy collegiate pathway, I stumbled upon Course Hero, where I can find study resources for nearly all my courses, get online help from tutors 24/7, and even share my old projects, papers, and lecture notes with other students.

    Student Picture

    Kiran Temple University Fox School of Business ‘17, Course Hero Intern

  • Left Quote Icon

    I cannot even describe how much Course Hero helped me this summer. It’s truly become something I can always rely on and help me. In the end, I was not only able to survive summer classes, but I was able to thrive thanks to Course Hero.

    Student Picture

    Dana University of Pennsylvania ‘17, Course Hero Intern

  • Left Quote Icon

    The ability to access any university’s resources through Course Hero proved invaluable in my case. I was behind on Tulane coursework and actually used UCLA’s materials to help me move forward and get everything together on time.

    Student Picture

    Jill Tulane University ‘16, Course Hero Intern