Relier Pairs Security+ 601: Cryptography - Part 1Version en ligne Match the terms and defintions; Part 1 focus more on practical definitions par Name Here Name 1 Certificate Chaining 2 Certificate Pinning 3 Trust Model 4 Cryptographic attack/cryptanalysis 5 CA (Certificate authority) 6 Certificate Stapling 7 Digital signature 8 PKI (Public Key Infrastructure) 9 P12 10 P7B 11 PKCS (Public Key Cryptography Standards) 12 CRL (Certificate revocation list) 13 Key Escrow The set of technology and processes required to create, manage, distribute, use, store, and revoke digital certs and public-keys A trusted entity that issues Secure Sockets Layer (SSL) certificates Top-down CA trust model; Any certificate that is between the device that you're connecting to and the root CA A file extension used for storing private keys with a certificate; can chain certificates A type of blocklist that includes certificates that should no longer be trusted; verified with web browsers Public key sender verified to own corresponding private key; provides a mechanism for verifying origin authentication, integrity, and non-repudiation Checks regularly for certificate invalidity Finding weaknesses in the cryptosystem The collection of rules that inform application on how to solve the legitimacy of a Digital Certificate; Direct, 3rd-Party, Hierarchical, Distributed A file extension for a certificate for public key sharing; Most commonly used on the Tomcat; Does not have private key Third party safeguarding private keys Associates certificate against known copy A set of protocols that facilitate the use of public key infrastructure in data exchange