EasyManua.ls Logo

Comtrol DeviceMaster LT - Page 49

Comtrol DeviceMaster LT
136 pages
Print Icon
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Loading...
DeviceMaster LT User Guide: 2000586 Rev. B
DeviceMaster LT Security - 49
Understanding Security Methods and Terminology
Who Provides
the
Infrastructure?
A number of products are offered that enable a company or group of companies
to implement a PKI. The acceleration of e-commerce and business-to-business
commerce over the Internet has increased the demand for PKI solutions.
Related ideas are the virtual private network (VPN) and the IP Security
(IPsec) standard. Among PKI leaders are:
RSA, which has developed the main algorithms used by PKI vendors.
Verisign, which acts as a certificate auth
ority and sells software that
allows a company to create its own certificate authorities.
GTE CyberTrust, which provides a P
KI implementation methodology and
consultation service that it plans to vend to other companies for a fixed
pri
ce.
Xcert, whose Web Sentry product that c
hecks the revocation status of
certificat
es on a server, using the Online Certificate Status Protocol
(OCSP).
Netscape, whose Directory Server produ
ct is said to support 50 million
objects and process 5,000 queries a second; Secure E-Commerce, which
allows a company or extranet manager to manage digital certificates; and
Meta-Directory, which can connect all corporate directories
into a single
directory for security man
agement.
The following topic references are from: http://searchsecurity.techtarget.com/
PKI (public key infrastructure)
How Public/Private Key Cryptography Works
Who Provides the Infrastructure
Digital Certificate
•DH Key
Man in the Middle attack
The RSA Key pair topic reference is from: http://en.wikipedia.org/wiki/RSA
Term or
Issue
Explanation

Table of Contents

Related product manuals