Term
Public Key Infrastructure |
|
Definition
An entire system of hardware and software, policies and procedures, and people, used to create, distribute, manage, store, and revoke digital certificates. |
|
|
Term
|
Definition
Digitally signed electronic documents that bind a public key with a user identity. |
|
|
Term
|
Definition
The entity (usually a server) that issues digital certificates to users. |
|
|
Term
|
Definition
When an individual certificate is mapped to a single recipient. |
|
|
Term
|
Definition
When multiple certificates are mapped to a single recipient. |
|
|
Term
|
Definition
Certificate Revocation List
A list of certificates no longer valid or that have been revoked by the issuer. |
|
|
Term
|
Definition
A common PKI standard developed by the ITU-T that incorporates the single sign-on authentication method. |
|
|
Term
|
Definition
When certificate keys are held in case third parties, such as government or other organizations, need access to encrypted communications. |
|
|
Term
|
Definition
A decentralized model used for sharing certificates without the need for a centralized CA. |
|
|
Term
|
Definition
An IETF standard that provides cryptographic security for electronic messaging such as e-mail. |
|
|
Term
|
Definition
Secure Sockets Layer
A cryptographic protocol that provides secure Internet communications such as web browsing, instant messaging, e-mail, and VoIP. |
|
|
Term
|
Definition
Transport Layer Security
The successor to SSL. Provides secure Internet communications. This is shown in a browser as HTTPS. |
|
|
Term
|
Definition
Secure Shell
A protocol that can create a secure channel between two computers or network devices. |
|
|
Term
|
Definition
Point-to-Point Tunneling Protocol
A tunneling protocol used to support VPNs. Generally includes security mechanisms, and no additional software or protocols need to be loaded. A VPN device or server must have inbound port 1723 open to enable incoming PPTP connections. |
|
|
Term
|
Definition
Layer 2 Tunneling Protocol
A tunneling protocol used to connect virtual private networks. It does not include confidentiality or encryption on its own. It uses port 1701 and can be more secure than PPTP ifused in conjunction with IPsec. |
|
|
Term
|
Definition
Internet Protocol Security
A TCP/IP protocol that authenticates and encrypts IP packets, effectively securing communications between computers and devices using the protocol. |
|
|