|
|
KDC (Key Distribution Center), 376–377, 377
KEA (Key Exchange Algorithm), 376, 377
keeping pace with security standards, 476–482
areas of professional responsibility, 477–478
trade publications, 480–481
websites on security issues, 479–480
Kerberos, 16, 16, 515
Key Distribution Center (KDC), 376–377, 377, 515
key escrow, 378–379
key escrow agency, 379, 515
Key Exchange Algorithm (KEA), 376, 377, 515
key expiration, 379
key generation
centralized, 375, 375
decentralized, 375–376, 376
defined, 515
overview, 374–375
split-system, 376
key life cycle, 374, 515
key revocation
about, 379–380
status checking of revoked keys, 380
key rollover, 383
key storage and distribution, 376–378, 377
hardware vs. software, 377–378
private key protection, 378
key suspension, 380, 515
key terms for exam
attacks, 92–93
cryptography, 348, 391
infrastructure and connectivity, 157–159
monitoring communications, 204–205
secure networks, 249, 300–301
security concepts, 40–41
security management, 489–490
security policies and procedures, 443–444
terms used for IDS, 175–176
keys
destruction of, 384
key attacks, 343–344
key life cycle, 374, 515
managing, 373–386
centralized vs. decentralized key generation, 374–376, 375, 376
defined, 373–374
key destruction, 384
key escrow, 378–379
key expiration, 379
key revocation, 379–380
key storage and distribution, 376–378, 377
key suspension, 380
key usage, 385–386, 385
recovering and archiving keys, 381–383, 381
renewing keys, 383
usage of, 385–386, 385
Klez32 virus, 86
|
|