framework that helps establish trust in public key cryptography
Public Key Infrastructure
uses public key cryptography to sign and encrypt messages
digital certificates
This is the first certificate that a Certificate Authority creates.
Root certificate
These are certificates that have not been validated or signed by a CA.
Self-signed certificates
This is no longer valid and cannot be reinstated.
revoked certificate
This aims to prove that the owners of public keys are who they say they are
Public key infrastructure (PKI)
This solves the problem of distributing encryption keys when you want to communicate securely
Public key cryptography
These certificates go through a different validation
process, which varies depending on the certificate and organization.
Self-signed certificates
Secure, encrypted emails are sent using the S/MIME Protocol.
Email certificate
This defines how users and different CAs can trust one another.
root of trust model
The certificate's validity is guaranteed by a ______
certificate authority (CA)
When you want others to send you confidential messages, you give them your ______
public key
These allow an organization to cover multiple domains with one certificate.
Subject Alternative Name (SAN) certificate
These are used in a network environment to identify and validate specific users or computers.
User and computer certificates
In this model, the root CA issues certificates to one or more intermediate CAs.
hierarchical model
This can use private or third-party CAs
PKI
When you want to authenticate yourself to others, you sign a _____ of your message
Hash
These are similar to SAN certificates. But instead of covering multiple domains, the organization can cover one domain and multiple subdomains.
Wildcard certificates
This is the process by which end users create an account with the CA and become authorized to request certificates.
Registration
To ensure data and email can always be recovered, you should create a backup of this.
the private keys
This is a public assertion of identity validated by a certificate authority (CA)
digital certificate
The email message can then only be decrypted by your _____ _____.
private key
These are used by app developers to prove their application is legitimate.
Code-signing certificates
These is a file containing the information the subject wants to use in the certificate, including its public key.
certificate signing request (CSR)
To mitigate private or secret key loss or damage, _____ _____ and quorum of persons controls can be used to mitigate.
Key escrow