Like what you see? Get it in one document for easy printing!
Click Here!
Use coupon code "certiguide" to save 20%!
(Expires 2004/12/31)

Test yourself better with 300 extra Security+ questions!
Get It Here!

Custom Search







Table Of Contents  CertiGuide to Security+
 9  Chapter 4:  Basics of Cryptography (Domain 4.0; 15%)
      9  4.2  Concepts in Using Cryptography

Previous Topic/Section
4.2.4.1  Digital Signatures
Previous Page
Pages in Current Topic/Section
1
Next Page
4.3  PKI (Public Key Infrastructure)
Next Topic/Section

4.2.5  Access Control

When using a shared secret key (symmetric key) all parties need to ensure the key is secured. This can be impractical when working with a large group. In a public/private key arrangement, the private key must remain private. Should a compromise of the private key occur, it must be destroyed. (Refer to 4.3.2)


Previous Topic/Section
4.2.4.1  Digital Signatures
Previous Page
Pages in Current Topic/Section
1
Next Page
4.3  PKI (Public Key Infrastructure)
Next Topic/Section

If you find CertiGuide.com useful, please consider making a small Paypal donation to help the site, using one of the buttons below. You can also donate a custom amount using the far right button (not less than $1 please, or PayPal gets most/all of your money!) In lieu of a larger donation, you may wish to consider buying an inexpensive PDF equivalent of the CertiGuide to Security+ from StudyExam4Less.com. (Use coupon code "certiguide" by December 31, 2004 to save 20%!) Thanks for your support!
Donate $2
Donate $5
Donate $10
Donate $20
Donate $30
Donate: $



Home - Table Of Contents - Contact Us

CertiGuide for Security+ (http://www.CertiGuide.com/secplus/) on CertiGuide.com
Version 1.0 - Version Date: November 15, 2004

Adapted with permission from a work created by Tcat Houser et al.
CertiGuide.com Version Copyright 2004 Charles M. Kozierok. All Rights Reserved.
Not responsible for any loss resulting from the use of this site.