Cisco CyberOps
HomeCertifications
  • Links
  • 1.0 Network Fundamentals - 20%
    • Exam Topics
  • 2.0 Network Access - 20%
    • Exam Topics
  • Security Monitoring
    • Attack Surface
    • Common Attacks
    • Data Types and Uses
  • Concealing the Attack
  • Certificates
    • What are certificates?
    • Certificate functions
    • Components
Powered by GitBook
On this page
  • CA - Certificates Authorities
  • Flow
  • Utilities
  • Provides
  • Type of Keys
  • Certificates Impacts
  • PKI - Public Key Infrastructure
  • Symetric
  • Asymmetric

Was this helpful?

  1. Certificates

Certificate functions

Legancy authentication problem - no encryption

Public Key cryptography can help on this using Public and Private Keys

CA - Certificates Authorities

They issue and sign certificates

Can be an Internal CA or Public CA

Flow

  1. Generate CSR with our information (Company)

  2. Send CSR to CA

  3. CA use your information to sign the certificate

Utilities

  1. Identification

  2. Authentication

  3. Controlling Access

Provides

  1. Non Repudiation

Type of Keys

Private - it signs a message and decrypt the messages

Public - give to anyone to validate the sender and encrypt the data

Certificates Impacts

PKI - Public Key Infrastructure

  1. Encrypt data in transit

  2. encrypts data

  3. create secure web connetions like - HTTPS,sFTP,SSH

Considerations

Symetric

  1. Private Keys

  2. Pre-shared Keys

  3. Same key to encrypt and decrypt

  4. Faster to encrypt and decrypt

  5. Both sides must have keys

  6. Less secure

Asymmetric

  1. Public and Private Keys

  2. Different Key to Encrypt and Decrypt

  3. Slow to encrypt and decrypt

  4. One side have Private Key

  5. Other Side have the Public Key

  6. One Way Encryption / Decryption

  7. MoreSecure

PreviousWhat are certificates?NextComponents

Last updated 3 years ago

Was this helpful?