Encryption and Public Key Infrastructure

Get Started. It's Free
or sign up with your email address
Rocket clouds
Encryption and Public Key Infrastructure by Mind Map: Encryption and Public Key Infrastructure

1. Encryption

1.1. Secure Sockets Layer (SSL) and successor Transport Layer Security (TLS)

1.2. Secure Hypertext Transfer Protocol (S-HTTP)

2. Two methods of encryption

2.1. Symmetric key encryption

2.2. Public key encryption

3. Types of encryption

3.1. Symmetric Keys

3.1.1. Encryption and decryption use the same key

3.2. Asymmetric Keys

3.2.1. Encryption and decryption use different keys, a public key and private key

3.3. One-way hash

4. Digital certificate

4.1. Data file used to establish the identity of users and electronic assets for protection of online transactions

4.2. Uses a trusted third party, certification authority (CA), to validate a user's identity

4.3. CA verifies user’s identity, stores information in CA server, which generates encrypted digital certificate containing owner ID information and copy of owner’s public key

5. Public key infrastructure (PKI)

5.1. Use of public key cryptography working with certificate authority

5.2. Widely used in e-commerce

6. System Availability

6.1. Online transaction processing requires 100% availability

6.2. Fault-tolerant computer systems

6.3. Deep packet inspection:

6.4. Security outsourcing

6.4.1. Managed security service providers (MSSPs)

7. Software Quality

7.1. Software metrics: Objective assessments of system in form of quantified measurements

7.2. Early and regular testing

7.3. Walkthrough: Review of specification or design document by small group of qualified people

7.4. Debugging: Process by which errors are eliminated

8. Security Issues

8.1. Cloud Computing

8.1.1. Responsibility for security resides with company owning the data

8.1.2. Firms must ensure providers provide adequate protection

8.1.3. Service level agreements (SLAs)

8.2. the Mobile Digital Platform

8.2.1. Security policies should include and cover any special requirements for mobile devices

8.2.2. Mobile device management tools

8.2.3. Software for segregating corporate data on devices