1 / 20

Public Key Infrastructure

Public Key Infrastructure. Ammar Hasayen 2013 . …. Going back in time. How things worked before. Face to Face. Paper work. Trust. Delivery. Badges. Authenticity. Corporate walls. Confidentiality. How things working Now. Virtual Team. Digital Collaboration. Wireless.

blithe
Télécharger la présentation

Public Key Infrastructure

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Public Key Infrastructure Ammar Hasayen2013

  2. …. Going back intime

  3. How things worked before Face to Face Paper work Trust Delivery Badges Authenticity Corporate walls Confidentiality

  4. How things working Now Virtual Team Digital Collaboration Wireless E-transactions Digital ID BYOD World is the limit Anywhere

  5. Defining Challenges Within Corporate Can be shared C.I.A Weak Identity How to identify people digitally? Active Directory You can be anyone Internet is like a big city

  6. …. IntroducingPKI

  7. Public Key Infrastructure Authenticity Non-Repudiation Confidentiality Integrity Public Key Technology People Policies Software Hardware Processes Framework Public Key Infrastructure is a framework consist of hardware, software, people, processes, and policies, that together helps identify and solve these problems for you by establishing safe and reliable environment for electronic transactions in the internet

  8. Digital Certificate Digital Certificate Certificate Authority A certificate authority maintains a revocation list that contains all digital certificates cancelled or suspended before their expiry dates.

  9. Digital Certificate Public Key Digital Certificate Private Key

  10. Secure Email Encrypt with Public Key Decrypt with Private Key

  11. …. Why PKI

  12. Starts at 1024 bit key length Asymmetric cryptography Users, Computers, Devices, Portals Authenticity, Integrity, Confidentiality Non Repudiation (Proof)

  13. Can be hosted in Smart Cards Extend trust beyond Corp boundaries Secure Technology Enabler Compliance Technology Neutral

  14. …. PKI Technologies

  15. Public Key Infrastructure Secure Email S/MIME Encrypt Files EFS Smart Cards Two-factor Authentication SSL Certificates Wireless Security PEAP –EAP-TLS Secure VPN Access

  16. Public Key Infrastructure is Enabler For Every Security Solution

  17. …. PKI Deployment

  18. PHASE 3 NAP 802.1X Smart Cards Secure VPN EFS S/MIME SSL TLS Introducing PKI Technologies PHASE 2 Devices Services Users Computers Defining Enrollees PHASE 1 Policies (CPS, CS) Secure PKI and defining roles Configuration (CRLS,AIA) Implement CA Servers Design PKI Infrastructure

  19. It is either your infrastructure that determines your service levelORyour service level determines your infrastructure

  20. Thank You

More Related