Shared Flashcard Set

Details

Security + Chapter 13
Security + Chapter 13
16
Computer Science
Not Applicable
08/02/2012

Additional Computer Science Flashcards

 


 

Cards

Term
Public Key Infrastructure
Definition
An entire system of hardware and software, policies and
procedures, and people, used to create, distribute, manage, store, and revoke digital
certificates.
Term
Certificates
Definition
Digitally signed electronic documents that bind a public key with a
user identity.
Term
Certificate Authority
Definition
The entity (usually a server) that issues digital certificates to
users.
Term
One-to-One Mapping
Definition
When an individual certificate is mapped to a single recipient.
Term
Many-to-One Mapping
Definition
When multiple certificates are mapped to a single recipient.
Term
CRL
Definition

Certificate Revocation List

 

A list of certificates no longer valid or that have been revoked by the issuer.

Term
X.509
Definition
A common PKI standard developed by the ITU-T that incorporates the single sign-on authentication method.
Term
Key Escrow
Definition
When certificate keys are held in case third parties, such as government or other organizations, need access to encrypted communications.
Term
Web of Trust
Definition
A decentralized model used for sharing certificates without the need for a centralized CA.
Term
S/MIME
Definition
An IETF standard that provides cryptographic security for electronic messaging such as e-mail.
Term
SSL
Definition

Secure Sockets Layer

 

A cryptographic protocol that provides secure Internet communications such as web browsing, instant messaging, e-mail, and VoIP.

Term
TLS
Definition

Transport Layer Security

 

The successor to SSL. Provides secure Internet communications. This is shown in a browser as HTTPS.

Term
SSH
Definition

Secure Shell

 

A protocol that can create a secure channel between two computers or network devices.

Term
PPTP
Definition

Point-to-Point Tunneling Protocol

 

A tunneling protocol used to support VPNs. Generally includes security mechanisms, and no additional software or protocols need to be loaded. A VPN device or server must have inbound port 1723 open to enable incoming PPTP connections.

Term
L2TP
Definition

Layer 2 Tunneling Protocol

 

A tunneling protocol used to connect virtual private networks. It does not include confidentiality or encryption on its own. It uses port 1701 and can be more secure than PPTP ifused in conjunction with IPsec.

Term
IPsec
Definition

Internet Protocol Security

 

A TCP/IP protocol that authenticates and encrypts IP packets, effectively securing communications between computers and devices using the protocol.

Supporting users have an ad free experience!