In any organization, ensuring encryption of data is a primary concern. However, understanding the underlying concepts of that encryption is important when designing and deploying a public-key infrastructure (PKI), as well as when troubleshooting the system and recovering data. This section will cover the following topics:
- Certificate authorities and digital certificates
- Recovery agent
- Public key
- Private key
- Key escrow
- Trust models
Certificate Authorities and Digital Certificates
When employing PKI in a company, it is vital to verify the authenticity . . .
The content below this message is for members only.