Download - Public Key Infrastructure
![Page 1: Public Key Infrastructure](https://reader033.vdocument.in/reader033/viewer/2022050821/56816385550346895dd46c9d/html5/thumbnails/1.jpg)
Public Key InfrastructureAmmar Hasayen2013
![Page 2: Public Key Infrastructure](https://reader033.vdocument.in/reader033/viewer/2022050821/56816385550346895dd46c9d/html5/thumbnails/2.jpg)
Going back in time
….
![Page 3: Public Key Infrastructure](https://reader033.vdocument.in/reader033/viewer/2022050821/56816385550346895dd46c9d/html5/thumbnails/3.jpg)
How things worked before
Face to Face
Corporate walls Badges Paper
work
TrustConfidentiality
Authenticity Delivery
![Page 4: Public Key Infrastructure](https://reader033.vdocument.in/reader033/viewer/2022050821/56816385550346895dd46c9d/html5/thumbnails/4.jpg)
How things working Now
Virtual Team
World is the limit Digital ID
Digital Collaboratio
n
WirelessAnywhere BYOD E-transactions
![Page 5: Public Key Infrastructure](https://reader033.vdocument.in/reader033/viewer/2022050821/56816385550346895dd46c9d/html5/thumbnails/5.jpg)
Defining Challenges
Within Corporate
Active Directory
Weak Identity
Can be shared
C.I.AInternet is like a big city
You can be anyone
How to identify people
digitally?
![Page 6: Public Key Infrastructure](https://reader033.vdocument.in/reader033/viewer/2022050821/56816385550346895dd46c9d/html5/thumbnails/6.jpg)
Introducing PKI
….
![Page 7: Public Key Infrastructure](https://reader033.vdocument.in/reader033/viewer/2022050821/56816385550346895dd46c9d/html5/thumbnails/7.jpg)
Public Key Infrastructure
Framework
PeoplePolicies
SoftwareHardwareProcesses
Public Key Technology
AuthenticityNon-Repudiation Confidentiality Integrity
Public Key Infrastructure is a framework consist of hardware, software, people, processes, and policies, that together helps identify and solve these problems for you by establishing safe and reliable environment for electronic transactions in the internet
![Page 8: Public Key Infrastructure](https://reader033.vdocument.in/reader033/viewer/2022050821/56816385550346895dd46c9d/html5/thumbnails/8.jpg)
Digital Certificate
Certificate Authority
Digital Certificate
A certificate authority maintains a revocation list that contains all digital certificates cancelled or suspended before their expiry dates.
![Page 9: Public Key Infrastructure](https://reader033.vdocument.in/reader033/viewer/2022050821/56816385550346895dd46c9d/html5/thumbnails/9.jpg)
Digital Certificate
Public Key
Private KeyDigital
Certificate
![Page 10: Public Key Infrastructure](https://reader033.vdocument.in/reader033/viewer/2022050821/56816385550346895dd46c9d/html5/thumbnails/10.jpg)
Secure Email
Encrypt with Public
Key
Decrypt with
Private Key
![Page 11: Public Key Infrastructure](https://reader033.vdocument.in/reader033/viewer/2022050821/56816385550346895dd46c9d/html5/thumbnails/11.jpg)
Why PKI
….
![Page 12: Public Key Infrastructure](https://reader033.vdocument.in/reader033/viewer/2022050821/56816385550346895dd46c9d/html5/thumbnails/12.jpg)
Starts at 1024 bit key length
Asymmetric cryptography
Users, Computers, Devices, Portals
Authenticity, Integrity, Confidentiality
Non Repudiation (Proof)
![Page 13: Public Key Infrastructure](https://reader033.vdocument.in/reader033/viewer/2022050821/56816385550346895dd46c9d/html5/thumbnails/13.jpg)
Can be hosted in Smart Cards
Extend trust beyond Corp boundaries
Secure Technology Enabler
Compliance
Technology Neutral
![Page 14: Public Key Infrastructure](https://reader033.vdocument.in/reader033/viewer/2022050821/56816385550346895dd46c9d/html5/thumbnails/14.jpg)
PKI Technologies
….
![Page 15: Public Key Infrastructure](https://reader033.vdocument.in/reader033/viewer/2022050821/56816385550346895dd46c9d/html5/thumbnails/15.jpg)
Public Key Infrastructure
SSL Certificates
Wireless Security
PEAP –EAP-TLS
Secure VPNAccess
Secure Email S/MIME
Encrypt FilesEFS
Smart CardsTwo-factor
Authentication
![Page 16: Public Key Infrastructure](https://reader033.vdocument.in/reader033/viewer/2022050821/56816385550346895dd46c9d/html5/thumbnails/16.jpg)
Public Key Infrastructure is Enabler For Every Security Solution
![Page 17: Public Key Infrastructure](https://reader033.vdocument.in/reader033/viewer/2022050821/56816385550346895dd46c9d/html5/thumbnails/17.jpg)
PKI Deployment
….
![Page 18: Public Key Infrastructure](https://reader033.vdocument.in/reader033/viewer/2022050821/56816385550346895dd46c9d/html5/thumbnails/18.jpg)
Implement CA Servers
Design PKI InfrastructureConfiguration (CRLS,AIA)
Policies (CPS, CS) Secure PKI and defining roles
Defining EnrolleesUsers Computers Services Devices
Introducing PKI TechnologiesSSL TLS S/MIME EFS
Smart Cards Secure VPN NAP 802.1X
PHASE1
PHASE2
PHASE3
![Page 19: Public Key Infrastructure](https://reader033.vdocument.in/reader033/viewer/2022050821/56816385550346895dd46c9d/html5/thumbnails/19.jpg)
It is either your infrastructure that determines your service
levelOR
your service level determines your infrastructure
![Page 20: Public Key Infrastructure](https://reader033.vdocument.in/reader033/viewer/2022050821/56816385550346895dd46c9d/html5/thumbnails/20.jpg)
Thank You