4.2.5 Access Control
When using a shared secret key (symmetric key) all parties need to ensure the key is secured. This can be impractical when working with a large group. In a public/private key arrangement, the private key must remain private. Should a compromise of the private key occur, it must be destroyed. (Refer to 4.3.2)
Home - Table Of Contents - Contact Us
CertiGuide for Security+ (http://www.CertiGuide.com/secplus/) on CertiGuide.com
Version 1.0 - Version Date: November 15, 2004
Adapted with permission from a work created by Tcat Houser et al.
CertiGuide.com Version © Copyright 2004 Charles M. Kozierok. All Rights Reserved.
Not responsible for any loss resulting from the use of this site.