I INF 453 Lecture Notes - Lecture 10: Configuration Management, Heat Detector, Server Room
PKI- Public Key Infrastructure
What is PKI for? ā A public key infrastructure is a set of roles, policies, and procedures needed to create,
manage, distribute, use, store, and revoke digital certificates and manage public-key encryption.
PKI infrastructure- *biggest one is Certificate Authority
VA - Role that says yes, verification is good
CA -Verifies the one verifying is good
RA - Individual certificate is good
CRL- Says which ones are not good.
Certificates - Public/Private key pairs. To get one, fill out Certificate Signing Request.
o Type and length, is how the encryption is going to work.
SSL/TLS - Hoī itās used? - Certificate given to server then client, then used to exchange shared key.
PKI bypass - Make certificates free
Quantum Computing
Quantum Physics- uī
¶til you oīserīe soī
µethiī
¶g you doī
¶āt kī
¶oī īhat state itās at. Just the state of you
seeing will change to a different state.
Quantum Computers- require traditional CPU and runs as sub processor. Qubit- Instead of running
somethiī
¶g oī
¶e thiī
¶g after aī
¶other itās all ruī
¶ī
¶iī
¶g at the saī
µe tiī
µe. Caī
¶ see results all at saī
µe tiī
µe.
Quantum Communications
Communicate and if any outside party observes you know because the quantum particle state has been
changed. So that they are not interceptable
Authentication & Access Control
Authentication vs Access Control ā Who are you? Prove it. vs what you can do once youre authenticated
Password managers- hold and can create passwords for you.
Access Control- Whoās alloīed to get aīīess. Whoās alloīed to īoī
¶ī
¶eīt iī
¶ usiī
¶g īhat
Awareness and Training- Employee and IT staff training
Audit and Accountability- The aīility to go īaīk aī
¶d see īhat happeī
¶s. Whoās iī
¶ īharge of īhat aī
¶d
īhoās lookiī
¶g. Go īaīk aī
¶d look at īhatās happeī
¶ed.
Recurring Assessments and Planning- Stress the fact that you have to do it over and over again. Disaster
reīoīery plaī
¶. Praītiīe for īall of a suddeī
¶ī situatioī
¶s.
find more resources at oneclass.com
find more resources at oneclass.com
Document Summary
A public key infrastructure is a set of roles, policies, and procedures needed to create, manage, distribute, use, store, and revoke digital certificates and manage public-key encryption. Va - role that says yes, verification is good. To get one, fill out certificate signing request: type and length, is how the encryption is going to work. Certificate given to server then client, then used to exchange shared key. Quantum physics- u(cid:374)til you o(cid:271)ser(cid:448)e so(cid:373)ethi(cid:374)g you do(cid:374)"t k(cid:374)o(cid:449) (cid:449)hat state it"s at. Just the state of you seeing will change to a different state. Quantum computers- require traditional cpu and runs as sub processor. Qubit- instead of running somethi(cid:374)g o(cid:374)e thi(cid:374)g after a(cid:374)other it"s all ru(cid:374)(cid:374)i(cid:374)g at the sa(cid:373)e ti(cid:373)e. ca(cid:374) see results all at sa(cid:373)e ti(cid:373)e. Communicate and if any outside party observes you know because the quantum particle state has been changed. Prove it. vs what you can do once youre authenticated.