PRINCIPLES OF INFORMATION SECURITY Chapter Notes -Public Key Infrastructure, Dns Spoofing, Public Key Certificate

15 views2 pages

Document Summary

You can go through the process of creating a key pier to send to with the public to get signed and that"s how it confirms that it"s really them. We then watch the video on what is p ki public key infrastructure and what i took from this video was. Pki is now used by businesses to handle security through encryption. People, devices, and apps can all use these keys. Pki security was first introduced in the 1990s to aid in the administration of encryption keys via the issue and management of digital certificates. To assist preserve security, these pki certificates validate the owner of a private key and the authenticity of that relationship in the future. For the digital world, the certificates are similar to a driver"s license or passport. We then watch the video on dns attacks. A dns attack is a type of hack that takes advantage of flaws in the domain name system.

Get access

Grade+20% off
$8 USD/m$10 USD/m
Billed $96 USD annually
Grade+
Homework Help
Study Guides
Textbook Solutions
Class Notes
Textbook Notes
Booster Class
40 Verified Answers
Class+
$8 USD/m
Billed $96 USD annually
Class+
Homework Help
Study Guides
Textbook Solutions
Class Notes
Textbook Notes
Booster Class
30 Verified Answers

Related Documents

Related Questions