Buch, Englisch, Book, Format (B × H): 178 mm x 254 mm
Understanding The Operational Model and Requirements
Buch, Englisch, Book, Format (B × H): 178 mm x 254 mm
ISBN: 978-1-4842-8302-8
Verlag: Apress
Zielgruppe
Professional/practitioner
Autoren/Hrsg.
Weitere Infos & Material
Chapter 1. What exactly is a PKI?Chapter Goals : The original concept and an overview Chapter 2. How does PKI work?Chapter Goals: This chapter will discuss the nuts and bolts of PKI Chapter 3. What are the primary applications for it? Chapter Goals: How applications are changingServer IdentificationAuthentication for Web ApplicationsElectronic Document SigningAuthentication for VPNsS/MIME Email Signing and EncryptionEmail List Server Chapter 4. What exactly is a digital certificate?Chapter Goals: The contents of a certificate and 3 versions available for X.509 discussed Chapter 5. What about encryption? Chapter Goals: How a PKI is used for encryption of sensitive data in an organization.SSL/TLS certificates Registration authorityCertificate AuthoritySymmetrical EncryptionAsymmetrical Encryption Chapter 6. Biometrics and PKI Chapter Goals: The possibilities of biometric certificates and how a biometric-PKI authentication system works. Chapter 7. What is the conventional wider infrastructure? Chapter Goals: Different infrastructure models explained Public Key Certificate, commonly referred to as 'digital certificate'.Private Key tokens.Certification Authority.Registration Authority.Certificate Management System.Chapter 8. Kubernetes, containers and PKI Chapter Goals: Kubernetes requires PKI certificates for authentication over TLS. In this chapter, we will discuss The container model and its implications for PKI. Chapter 9. How may we trust Certificate Authorities? Chapter Goals: The original concept has changed Chapter 10. What’s wrong with a self signed certificate? Chapter Goals: self-signed certificates are public key certificates that their users issue on their own behalf, as opposed to a certificate authority issuing them. Here we will discuss the trust associated with self signed certificates Chapter 11. How may a localised infrastructure work? Chapter Goals: Keeping things simple Chapter 12. What happens when certificates expire? Chapter Goals: What can go wrong? Chapter 13. How do we ensure that certificates do not expire? Chapter Goals: Methodologies for security Chapter 14. How does the the human interaction work? Chapter Goals: Managing things manually. CSTCASRK Certificates Chapter 15. Can we organize everything ourselves? Chapter Goals: Understanding what to do Chapter 16. How long does it take to implement a proper PKI? Chapter Goals: Understanding the scale of the problem Chapter 17. What skills do we need for operational personnel? Chapter Goals: Understanding associated technologies Chapter 18. How do we embed a PKI culture in the workplace? Chapter Goals: CommunicationPeer-to-Peer networks Chord protocol Chord architecture Chapter 19. How do we keep it all working as we grow? Chapter Goals: Planning and documentation Chapter 20.What happens if we acquire other companies?Chapter Goals: Merging PKIsUnderstanding Certificate policiesCertificate Practice Statement(CPS), Cross-Certification, PKI Interoperability. Chapter 21. Who should be responsible for it all? Chapter Goals: Accountability Chapter 22. PKI, the Cloud and the Internet of Things.Chapter Goals: What we should understand Chapter 23. PKI and the global financial industry Chapter Goals: The reliance upon a large scale PKI Chapter 24. PKI and government legislation Chapter Goals: Ensuring that legislation is compatible