Chapter 4 Security Plus

123456789101112131415161718192021222324252627
Across
  1. 1. multiple CAs that sign digital certificates
  2. 6. management of keys and digital certificates at scale
  3. 7. An certificate that uses an asterisk to cover multiple subdomains
  4. 8. The entity that is responsible for digital certificates
  5. 10. one master CA called the root
  6. 13. associate a user’s identity to a public key
  7. 15. confidence in or reliance on another person/entity
  8. 18. published set of rules that govern operation of a PKI
  9. 19. A process in which keys are managed by a third party
  10. 20. A protocol suite for securing Internet Protocol (IP) communications
  11. 21. securely distributing encryption keys between two parties
  12. 22. Tracing a certificate back to the highest level of a CA
  13. 23. An entity that is trusted by others
  14. 24. The common file types for storing X.509 certificates
  15. 25. A list of certificate serial numbers that have been revoked
  16. 26. an extension to X.509 that allows various values to be associated with a security certificate
  17. 27. Data that is encapsulated within a secure outer shell
Down
  1. 2. replaces SSL
  2. 3. Encrypts only the payload preserves the original IP header
  3. 4. digitally sign a program
  4. 5. M of N
  5. 9. A method of controlling public keys
  6. 11. publicly accessible centralized directory of digital certificates
  7. 12. performs a real-time lookup of a certificate’s status
  8. 14. A request submitted to a Certificate Authority for an TLS/SSL certificate
  9. 16. Encrypts the entire IP packet and encapsulates it within a new IP packet
  10. 17. web servers send queries to the OCSP Responder