CompTIA Security+ 501 Summary Part 10
This is a summary of my notes on Chapter 10 of the CompTIA Security+ Get Certified Get Ahead by Darril Gibson, 5th Edition
Things to keep in mind:
2. Certificates and PKI Asymmetric Encryption requires a PKI and an issued Certificate. Certificates contain a lot more information than just the public key:
- CompTIA is releasing an updated version of the Security+ Exam in November 2020 so this edition will soon be outdated. 90% of the book will remain the same in accordance with the updated exam. New threats and cloud-computing technology will probably make up the majority of that new 10% of content.
- Synthesizing paragraphs with a huge list of facts sometimes results in dreadful sentences. It also results in some streams of thought that end abruptly. Some notes cannot be digested any further and remain identical in this summary. In any case, these are just notes and not an essay.
- Some things are repeated but this is simply to reinforce.
- Hackers are referred to as actors.
- Access Points are referred to as AP
2. Certificates and PKI Asymmetric Encryption requires a PKI and an issued Certificate. Certificates contain a lot more information than just the public key:
- Serial Number = uniquely identifies the certificates.
- Issuer = identifies the Certificate Authority, or CA, that issued the cert.
- Validity Dates = Valid from and Valid till dates.
- Subject = identifies the owner of the cert.
- Public Key = public key.
- Usage = some certs are only used for encryption or authentication.
- Machine/Computer = Certificates issued to a device or a computer are commonly called machine certificates or computer certificates.
- User = Certificates can also be issued to users.
- Email = The two uses of email certificates are for encryption of emails and digital signatures.
- Code signing = Developers often use code signing certificates to validate the authentication of executable applications or scripts.
- Self-signed = A self-signed certificate is not issued by a trusted CA. Private CAs within an enterprise often create self-signed certificates.
- Wildcard = A wildcard certificate starts with an asterisk (*) and can be used for multiple domains, but each domain name must have the same root domain.
- SAN = A Subject Alternative Name (SAN) is used for multiple domains that have different names, but are owned by the same organization. It is most commonly used for systems with the same base domain names, but different top-level domains.
- Domain validation = A domain-validated certificate indicates that the certificate requestor has some control over a DNS domain. The CA takes extra steps to contact the requestor such as by email or telephone.
- Extended validation = Extended validation certificates use additional steps beyond domain validation.