Relier Pairs Security+ 601: Cryptography - Part 1Version en ligne Match the terms and defintions; Part 1 focus more on practical definitions par Name Here Name 1 Trust Model 2 Certificate Pinning 3 CA (Certificate authority) 4 Key Escrow 5 Certificate Stapling 6 P12 7 Cryptographic attack/cryptanalysis 8 Certificate Chaining 9 CRL (Certificate revocation list) 10 Digital signature 11 P7B 12 PKI (Public Key Infrastructure) 13 PKCS (Public Key Cryptography Standards) The collection of rules that inform application on how to solve the legitimacy of a Digital Certificate; Direct, 3rd-Party, Hierarchical, Distributed Third party safeguarding private keys A file extension for a certificate for public key sharing; Most commonly used on the Tomcat; Does not have private key A type of blocklist that includes certificates that should no longer be trusted; verified with web browsers Associates certificate against known copy Finding weaknesses in the cryptosystem Checks regularly for certificate invalidity The set of technology and processes required to create, manage, distribute, use, store, and revoke digital certs and public-keys A trusted entity that issues Secure Sockets Layer (SSL) certificates Public key sender verified to own corresponding private key; provides a mechanism for verifying origin authentication, integrity, and non-repudiation A file extension used for storing private keys with a certificate; can chain certificates A set of protocols that facilitate the use of public key infrastructure in data exchange Top-down CA trust model; Any certificate that is between the device that you're connecting to and the root CA