Presentation1 - PKI PUBLIC KEY INFRASTRUCTURE What is PKI...

Info iconThis preview shows pages 1–7. Sign up to view the full content.

View Full Document Right Arrow Icon
PKI PUBLIC KEY INFRASTRUCTURE
Background image of page 1

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
What is PKI PKI provides a wide variety of components, applications, policies, procedures and practices to achieve security requirements (authentication, authorization, non repudiation, privacy, and integrity) PKIs provide the basic security for secure communication. They do that by managing and controlling the use of cryptographic keys and certificates.
Background image of page 2
Security Requirements Authentication: In a PKI enabled environment, it can use digital signature and public key certificate processes to authenticate individuals, servers. Authorization:To prevent unauthorized activity. When an application is PKI enabled, it can cross- reference an entity verified identity with a privilege list.
Background image of page 3

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Security Requirements Non-repudiation: Provides the tool to make it easy to prove that an individual has participated in a transaction. Privacy: Prevents eavesdropping or unauthorized access. Integrity: Prevents data tampering, ensures data is not altered.
Background image of page 4
Components of PKI Security policy End Entity Application (EE) Certification Authority (CA) Registration Authority (RA) Certificate repository and distribution system PKI enabled application
Background image of page 5

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Security Policy There are two policies that determine the operational and technical practices of a PKI Certificate Policy (CP) A named set of rules that indicates the applicability of a certificate to a particular class of application with common security requirements. Certification Practice Statement (CPS)
Background image of page 6
Image of page 7
This is the end of the preview. Sign up to access the rest of the document.

This note was uploaded on 06/09/2011 for the course BUSINESS 5970 taught by Professor Jhon during the Spring '09 term at Webster.

Page1 / 21

Presentation1 - PKI PUBLIC KEY INFRASTRUCTURE What is PKI...

This preview shows document pages 1 - 7. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online