|
Part of the OSI reference model. The application layer is also known as layer seven, the highest layer in the OSI model.
See also OSI(Open Systems Interconnection).
Verification of a claimed identity.
A unique, measurable characteristic or trait of a human being used for automatically recognizing or verifying an identity.
An authority that issues and manages security credentials for a PKI.
A cryptographic key known only to the CA that is used to certify user or server certificate requests.
The CERT Coordination Center is an organization that grew from the Computer Emergency Response Team formed by the Defense Advanced Research Projects Agency (DARPA) in November 1988 in response to the problems generated during the Internet worm incident. (See http://www.cert.org/)
A digital identifier linking an entity and a trusted third party with the ability to confirm the entity's identification. Typically stored in a browser or a smart card.
A person or system bound to the certificate. The owner is the person that has access to view and manipulate the certificate.
A set of rules that indicates the applicability of a certificate to a particular environment or application with common security requirements.
This is a statement of the practices that a certificate authority (CA) employs in issuing certificates.
Alternative term for an encryption algorithm.
Text (or data) that has previously been encrypted.
A database of certificates no longer valid within a given PKI infrastructure.
A discipline that embodies principles, means, and methods for the transformation of data in order to hide its information content, prevent its undetected modification, and prevent its unauthorized use.
The protocol for carrier transmission access in Ethernet networks.
A research branch of the U.S. Department of Defense that was one of the founder's projects that led to the development of the Internet.
Part of the OSI reference model, this layer provides error control and synchronization for the physical level.
A distributed denial of service attack. This DoS attack exploits several machines to make the attack.
The process of transforming ciphertext back into plaintext.
Acts intended to cause a service to become unavailable or unusable. In an Internet environment, a service might be an application such as a web or mail server, or a network service.
A method of data encryption using a private (secret) key. DES uses a 56-bit key to each 64-bit block of data.
A digital certificate is an electronic mechanism that binds a set of credentials to a particular person or system. A CA will issue the certificates.
Data appended to, or a cryptographic transformation of a data unit, that allows a recipient of the data unit to prove the source and integrity of the data unit and protect against forgery.
A network inserted as a "buffer zone" between a company's private, or trusted, network and the outside, untrusted network.
A method by which Internet domain names are converted into IP addresses.
|