I INF 453 Lecture Notes - Lecture 10: Configuration Management, Heat Detector, Server Room

34 views2 pages
PKI- Public Key Infrastructure
What is PKI for? ā€“ A public key infrastructure is a set of roles, policies, and procedures needed to create,
manage, distribute, use, store, and revoke digital certificates and manage public-key encryption.
PKI infrastructure- *biggest one is Certificate Authority
VA - Role that says yes, verification is good
CA -Verifies the one verifying is good
RA - Individual certificate is good
CRL- Says which ones are not good.
Certificates - Public/Private key pairs. To get one, fill out Certificate Signing Request.
o Type and length, is how the encryption is going to work.
SSL/TLS - Hoī‡ itā€™s used? - Certificate given to server then client, then used to exchange shared key.
PKI bypass - Make certificates free
Quantum Computing
Quantum Physics- uī…¶til you oī„serī‡€e soī…µethiī…¶g you doī…¶ā€™t kī…¶oī‡ ī‡hat state itā€™s at. Just the state of you
seeing will change to a different state.
Quantum Computers- require traditional CPU and runs as sub processor. Qubit- Instead of running
somethiī…¶g oī…¶e thiī…¶g after aī…¶other itā€™s all ruī…¶ī…¶iī…¶g at the saī…µe tiī…µe. Caī…¶ see results all at saī…µe tiī…µe.
Quantum Communications
Communicate and if any outside party observes you know because the quantum particle state has been
changed. So that they are not interceptable
Authentication & Access Control
Authentication vs Access Control ā€“ Who are you? Prove it. vs what you can do once youre authenticated
Password managers- hold and can create passwords for you.
Access Control- Whoā€™s alloī‡ed to get aī„ī„ess. Whoā€™s alloī‡ed to ī„oī…¶ī…¶eī„t iī…¶ usiī…¶g ī‡hat
Awareness and Training- Employee and IT staff training
Audit and Accountability- The aī„ility to go ī„aī„k aī…¶d see ī‡hat happeī…¶s. Whoā€™s iī…¶ ī„harge of ī‡hat aī…¶d
ī‡hoā€™s lookiī…¶g. Go ī„aī„k aī…¶d look at ī‡hatā€™s happeī…¶ed.
Recurring Assessments and Planning- Stress the fact that you have to do it over and over again. Disaster
reī„oī‡€ery plaī…¶. Praī„tiī„e for īžall of a suddeī…¶īŸ situatioī…¶s.
find more resources at oneclass.com
find more resources at oneclass.com
Unlock document

This preview shows half of the first page of the document.
Unlock all 2 pages and 3 million more documents.

Already have an account? Log in

Document Summary

A public key infrastructure is a set of roles, policies, and procedures needed to create, manage, distribute, use, store, and revoke digital certificates and manage public-key encryption. Va - role that says yes, verification is good. To get one, fill out certificate signing request: type and length, is how the encryption is going to work. Certificate given to server then client, then used to exchange shared key. Quantum physics- u(cid:374)til you o(cid:271)ser(cid:448)e so(cid:373)ethi(cid:374)g you do(cid:374)"t k(cid:374)o(cid:449) (cid:449)hat state it"s at. Just the state of you seeing will change to a different state. Quantum computers- require traditional cpu and runs as sub processor. Qubit- instead of running somethi(cid:374)g o(cid:374)e thi(cid:374)g after a(cid:374)other it"s all ru(cid:374)(cid:374)i(cid:374)g at the sa(cid:373)e ti(cid:373)e. ca(cid:374) see results all at sa(cid:373)e ti(cid:373)e. Communicate and if any outside party observes you know because the quantum particle state has been changed. Prove it. vs what you can do once youre authenticated.

Get access

Grade+20% off
$8 USD/m$10 USD/m
Billed $96 USD annually
Grade+
Homework Help
Study Guides
Textbook Solutions
Class Notes
Textbook Notes
Booster Class
40 Verified Answers
Class+
$8 USD/m
Billed $96 USD annually
Class+
Homework Help
Study Guides
Textbook Solutions
Class Notes
Textbook Notes
Booster Class
30 Verified Answers

Related Documents