• Log In
  • Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar

Security Architecture

MIS 5214 - Section 001 - David Lanter

Security Architecture

MIS 5214.951 ■ Spring 2023 ■ Jose Gomez
  • Homepage
  • Instructor
  • Syllabus
  • Schedule
    • First Half of the Course
      • Unit 0a – Introduction
      • Unit 0b – The Threat Environment
      • Unit 1a – System Security Plan
      • Unit 1b – Planning and Policy
      • Unit 2a – Case Study 1 – A High Performance Computing Cluster Under Attack: The Titan Incident
      • Unit 2b – Cryptography
      • Unit 3a – Secure Networks
      • Unit 3b – Firewalls, Intrusion Detection and Protection Systems
    • Second Half of the Course
      • Unit 4b – Case Study 2 Data Breach at Equifax
      • Unit 5a – Access Control
      • Unit 5b Host Hardening
      • Unit 6a Application Security
      • Unit 6b Data Protection
      • Unit 7a – Incident and Disaster Response
  • Deliverables
    • Assignments
    • Case Studies
      • Case Study 1 – A High Performance Computing Cluster Under Attack: The Titan Incident
      • Case Study 2 – Data Breach at Equifax
    • Team Project Instructions
  • Harvard Coursepack

Public Key Infrastructure and X.509 Public Key Certificates

January 1, 2022 by Jose Gomez 2 Comments

Filed Under: 3a - Secure Networks Tagged With:

Reader Interactions

Comments

  1. Chenhao Zhang says

    March 1, 2024 at 11:25 am

    Public Key Infrastructure (PKI)
    PKI is a set of hardware, software, people, policies, and processes required to create, manage, distribute, use, store, and revoke digital certificates. These certificates contain public keys that are used to encrypt data, ensuring secure and authenticated communication between two parties.
    The main components of PKI include:
    Certification Authority (CA): A trusted third party that issues and revokes digital certificates. The ca creates the certificate by verifying the identity of the certificate applicant and signing its public key with its own private key.
    Registration Authority (RA): Responsible for collecting and verifying the identity information of certificate applicants. The RAs forwards this information to the CA to issue a certificate.
    Repository: A secure location to store and distribute issued certificates. The repository can be online or offline, depending on the needs of the organization.
    X.509 Public Key Certificate:X.509 is the standard for public key certificates. These certificates are issued by the CA and contain the certificate holder’s public key, their identity information, the CA’s signature, and other relevant details. X.509 certificates are widely used on the Internet for secure communication protocols such as SSL/TLS.

    Log in to Reply
  2. Yi Liu says

    March 3, 2024 at 6:01 pm

    Public Key Infrastructure (PKI) is a framework used to manage digital certificates and public-key encryption, enabling secure communications over networks like the Internet. It involves issuing, managing, storing, and revoking digital certificates. X.509 is a standard defining the format of public key certificates, used in PKI systems to verify that a public key belongs to the user, computer, or service identity contained within the certificate.
    PKI involves the issuance, management, storage, and revocation of digital certificates. PKI relies on a trusted authority, known as a Certificate Authority (CA), to issue and verify digital certificates. These certificates are essential for establishing secure connections, ensuring the confidentiality and integrity of data, and authenticating the identities of individuals, websites, and services involved in digital communications.

    Log in to Reply

Leave a Reply Cancel reply

You must be logged in to post a comment.

Primary Sidebar

READINGS & CASE STUDY QUESTIONS

  • 0a – Introduction (1)
  • 0b – The Threat Environment (5)
  • 1a – System Security Plan (4)
  • 1b – Planning and Policy (4)
  • 2a – Case Study 1 (4)
  • 2b – Cryptography (4)
  • 3a – Secure Networks (5)
  • 3b – Firewalls and IDS and IPS (3)
  • 4b – Case Study 2 (4)
  • 5a – Access Control (5)
  • 5b – Host Hardening (3)
  • 6a – Application Security (4)
  • 6b – Data Protection (2)
  • 7a – Incident and Disaster Response (3)
Fox School of Business

Copyright © 2025 · Course News Pro on Genesis Framework · WordPress · Log in