null
US
Iniciar Sesión
Regístrate Gratis
Registro
Hemos detectado que no tienes habilitado Javascript en tu navegador. La naturaleza dinámica de nuestro sitio requiere que Javascript esté habilitado para un funcionamiento adecuado. Por favor lee nuestros
términos y condiciones
para más información.
Siguiente
Copiar y Editar
¡Debes iniciar sesión para completar esta acción!
Regístrate gratis
58696
Crypto U10 (part 2), Key Management and Lifecycle
Descripción
(Unit 10 - Key Mgt Lifecycle) IYM002 Mapa Mental sobre Crypto U10 (part 2), Key Management and Lifecycle, creado por jjanesko el 27/04/2013.
Sin etiquetas
iym002
unit 10 - key mgt lifecycle
iym002
unit 10 - key mgt lifecycle
Mapa Mental por
jjanesko
, actualizado hace más de 1 año
Más
Menos
Creado por
jjanesko
hace más de 11 años
111
10
0
Resumen del Recurso
Crypto U10 (part 2), Key Management and Lifecycle
lifecycle (continued)
key usage
principle of key separation
cryptographic keys must only be used for their intended purpose
enforcing
hardware based
key tagging
add information to key to indicate purpose
key blocks
format key to also contain data related to the key
key change
planned vs. unplanned
sometimes it's better to withdraw key
can be expensive
symmetric keys can be replaced relatively easily
public key pairs
private keys can be replaced relatively easily
public keys are more challenging because they are distributed to many people potentially
key activation
process by which keys are authorized for use at any given time
ex. I enter a passphrase and that activates a key for use
key destruction
when?
at key expiration
when key is withdrawn before expiry
at the end of a period of key archival
deleting is not enough
use data erasure or data sanitisation mechanims
governing key managment
guidance
policy
define overall requirements and strategy for key management
practice
Define tactics that will be used in order to achieve the key management policy goals.
procedure
Document step-by-step tasks necessary to implement the key management practices.
Mostrar resumen completo
Ocultar resumen completo
¿Quieres crear tus propios
Mapas Mentales
gratis
con GoConqr?
Más información
.
Similar
Crypto U10 (part 1), Key Management & Lifecycle
jjanesko
Crypto U4, Block Cipher, Cipher Feedback Mode (CFB)
jjanesko
Crypto U4, Block Cipher, Cipher Block Chaining Mode (CBC)
jjanesko
Crypto U1, Basic Principles
jjanesko
Crypto U3, Theoretical vs. Practical Security
jjanesko
Crypto U4, Stream Cipher
jjanesko
Crypto U4, Block Cipher, Electronic Codebook Mode (ECB)
jjanesko
Crypto U4, Block Cipher, Counter Mode
jjanesko
Crypto U2, Crypto design principles
jjanesko
Crypto U8, example dynamic password scheme
jjanesko
Crypto U9, Cryptographic Protocols
jjanesko
Explorar la Librería