CyberProtex
  • SERVICES
    • Managed Services >
      • Security Operations Center
      • Continuous Monitoring
      • Endpoint Protection
    • Security and Compliance >
      • CMMC Certified Services
      • Assessments
      • Phishing Simulations
      • Incident Response
  • SOFTWARE
    • Azure Migrations >
      • Azure Security and Federation
      • Identity and Access Management
    • Dynamics 365
    • SQL Management
    • DevSecOps
    • Application Security
    • Software Products >
      • Vulnerability Genius Software
      • eMASS Simulator Software
      • ICS - SCADA Simulations
      • CyberLMS Software
  • Training
    • Certification Courses
    • CMMC-Summit
    • Cyber Workshops
    • CyberPatriot Competition
    • ICS - SCADA Training
    • YouTube Channel
    • Online Courses
  • About Us
    • Careers
    • Partners
    • Corporate-Offices >
      • Training Center
    • Community Outreach
  • Contact
  • BLOGS
CyberProtex - Social Engineering Matching Game

CyberProtex - PKI Terms Matching Game

Drag and Drop the Terms Numbers to the appropriate Definition

Digital Certificate
Digital Signature
CA
CRL
Public Key
OCSP
Private Key
PKI
X.509
PKCS
RA
  
Authority in a network (PKI) that issues and manages security credentials and public keys for message encryption.
A list of subscribers paired with their digital signature status, specifically the revoked certificates and the reason for the revocation
A digital document which is generally stored and administered in a central directory. It contains the certificate holder's name, a serial number, expiration dates, public key and the digital signature of the certificate issuing authority.
An electronic value that authenticates the identity of the sender, ensures the original content of the message is unchanged, is easily transportable, cannot be easily repudiated, cannot be imitated, and can be automatically time stamped.
Standard for checking whether digital certificates are valid at the time of a given transaction.
The private part of a two-part, public key asymmetric cryptography system. The private key is provided by a certificate authority, kept secret and never transmitted over a network.
The public part of a two-part, public key asymmetric cryptography system. The public key is provided by a certificate authority and can be retrieved over a network.
A system that enables users of a public network to exchange data securely and privately through the use of a public and private cryptographic key pair that is obtained and shared through a trusted authority. Provides for a digital certificate that can identify an individual or an organization and director services that can store and, when necessary, revoke the certificates. The comprehensive architecture includes key management, the registration authority, certificate authority, and various administrative tool sets.
Set of intervendor standard protocols for making possible secure information exchange on the Internet using a public key infrastructure. Standards include RSA encryption, password-based encryption, extended certificate syntax, and cryptographic message syntax for S/MIME.
The authority in a Public Key Infrastructure that verifies user requests for a digital certificate and tells the certificate authority it is alright to issue a certificate.
Certificate authority standard.
CyberProtex, LLC - 2012-2023

ContactUs@CyberProtex.com

256-401-7072
Picture
Picture
  • SERVICES
    • Managed Services >
      • Security Operations Center
      • Continuous Monitoring
      • Endpoint Protection
    • Security and Compliance >
      • CMMC Certified Services
      • Assessments
      • Phishing Simulations
      • Incident Response
  • SOFTWARE
    • Azure Migrations >
      • Azure Security and Federation
      • Identity and Access Management
    • Dynamics 365
    • SQL Management
    • DevSecOps
    • Application Security
    • Software Products >
      • Vulnerability Genius Software
      • eMASS Simulator Software
      • ICS - SCADA Simulations
      • CyberLMS Software
  • Training
    • Certification Courses
    • CMMC-Summit
    • Cyber Workshops
    • CyberPatriot Competition
    • ICS - SCADA Training
    • YouTube Channel
    • Online Courses
  • About Us
    • Careers
    • Partners
    • Corporate-Offices >
      • Training Center
    • Community Outreach
  • Contact
  • BLOGS