From the course: CCSP Cert Prep: 2 Cloud Data Security Audio Review
Unlock the full course today
Join today to access over 22,700 courses taught by industry experts or purchase this course individually.
Public key infrastructure
From the course: CCSP Cert Prep: 2 Cloud Data Security Audio Review
Public key infrastructure
- [Instructor] In chapter four of the video course, I discussed the public key infrastructure and the role of digital signatures and digital certificates in the cloud. Let's review some of the key concepts. The Public Key Infrastructure, or PKI, is a system that allows the secure distribution and use of asymmetric cryptography keys through the use of trusted third parties. These third parties are known as Certificate Authorities, or CAs. And CAs issue digital certificates to organizations, servers, and individuals. The purpose of the certificate is to securely tie a public key to its owner. Now there are a few technologies involved in creating these certificates. The first important technology is the cryptographic hash function. A hash function is a mathematical algorithm that takes a variable length input and translates it into a unique fixed length output. The most common hash algorithm is the Secure Hash…
Contents
-
-
-
(Locked)
Cloud data storage1m 43s
-
(Locked)
Cloud data storage Q&A1m 27s
-
(Locked)
Encryption2m 7s
-
(Locked)
Encryption Q&A1m 33s
-
(Locked)
Key management1m 54s
-
(Locked)
Key management Q&A1m 46s
-
(Locked)
Public key infrastructure2m 28s
-
(Locked)
Public key infrastructure Q&A1m 32s
-
(Locked)
Cryptographic applications1m 53s
-
(Locked)
Cryptographic applications Q&A1m 20s
-
(Locked)
Data protection1m 52s
-
(Locked)
Data protection Q&A1m 14s
-
(Locked)
Information management2m 52s
-
(Locked)
Information management Q&A1m 4s
-
(Locked)
Data event auditability2m 59s
-
(Locked)
Data event auditability Q&A1m 1s
-
(Locked)
-