9781111640125_IM_ch12

Security+ Guide to Network Security Fundamentals

Info iconThis preview shows pages 1–4. Sign up to view the full content.

View Full Document Right Arrow Icon
Security+ Guide to Network Security Fundamentals, Fourth Edition 12-1 Chapter 12 Advanced Cryptography At a Glance Instructor’s Manual Table of Contents Overview Objectives Teaching Tips Quick Quizzes Class Discussion Topics Additional Projects Additional Resources Key Terms
Background image of page 1

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Security+ Guide to Network Security Fundamentals, Fourth Edition 12-2 Lecture Notes Overview In this chapter, you will learn practical methods for applying cryptography to protect data. You will first learn about digital certificates and how they can be used. Next, you will explore public key infrastructure and key management. Finally, you see how to use cryptography on data this is being transported. Chapter Objectives Define digital certificates List the various types of digital certificates and how they are used Describe the components of Public Key Infrastructure (PKI) List the tasks associated with key management Describe the different transport encryption algorithms Teaching Tips Digital Certificates 1. Mention that using digital certificates involves understanding their purpose, knowing how they are authorized, stored, and revoked, and determining which type of digital certificate is appropriate for different situations. Defining Digital Certificates 1. Explain that digital certificates make it possible to show that a message came from a particular person. 2. Emphasize that a flaw in public key encryption is that a message can be intercepted and an imposter key used instead. Use Figure 12-1 to illustrate your explanation. 3. Describe the information typically contained in a digital certificate, including the following: a. Owner’s name or alias b. Owner’s public key c. Name of the issuer d. Digital signature of the issuer e. Serial number of the digital certificate f. Expiration date of the public key
Background image of page 2
Security+ Guide to Network Security Fundamentals, Fourth Edition 12-3 Managing Digital Certificates 1. Define a Certificate Authority (CA) as an entity that issues digital certificates for others. 2. Explain that a user provides information to a CA that verifies her identity. The user generates public and private keys and sends the public key to the CA. The CA inserts this public key into the certificate. 3. Explain that a Registration Authority (RA) handles some CA tasks such as processing certificate requests and authenticating users. 4. Define a Certificate Revocation List (CRL) as a list of revoked certificates. CRLs can be accessed to check the certificate status of other users. Most CRLs can either be viewed or downloaded directly into the user’s Web browser. Use Figure 12-2 to illustrate your explanation. 5. Define a Certificate Repository (CR) as a publicly accessible directory that contains the certificates and CRLs published by a CA. CRs are often available to all users through a Web browser interface. Use Figure 12-3 to illustrate your explanation.
Background image of page 3

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Image of page 4
This is the end of the preview. Sign up to access the rest of the document.

Page1 / 10

9781111640125_IM_ch12 - Security+ Guide to Network Security...

This preview shows document pages 1 - 4. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online