Page 574 - StudyBook.pdf
P. 574

558    Chapter 10 • Public Key Infrastructure

             Introduction


             From its earliest days in academia, the Internet was designed with the assumption
             that it was something akin to a “private club,” with the main goal being the free
             exchange of ideas and information.Although many of the research partners
             engaged in developing the networking protocols underlying the Internet were from
             the United States government’s Department of Defense, protection was assumed to
             be present by the sheer complexity and innovativeness of the network itself, and an
             unstated assumption that “gentleman engineers” would not engage in deceitful
             endeavors.With the birth of the World Wide Web (the “Web”) in the early 1990s,
             the Internet was opened up to anyone and everyone, and it soon became clear that
             something would need to be done to allow users, public and technical alike, to
             confirm that they were communicating with correctly identified parties.
                 A related goal was to allow for the secret transmission of data across networks
             that were assumed to be publicly open and under attack by people monitoring
             and/or altering the traffic flowing across them.The protection from monitoring
             and alteration attacks has already been discussed in the chapter on cryptography,
             and the identification of communicating parties was achieved through protocols
             that allow for Public Key Infrastructures (PKIs) to be created and used.
                 The Security+ exam covers PKI completely, due to its extensive integration
             into modern networks for security purposes.The Security+ exam also covers the
             components of PKI, such as certificates, trust models, and specialized servers.The
             Security+ exam tests your knowledge of key management and certificate lifecycle
             issues, including storage, revocation, renewal, and suspension.To survive in this
             evolving world of network security, you need to have a proficient understanding of
             PKI, not only as it is currently implemented in technology, but also as a conceptual
             framework that will be used regardless of the underlying technology.


             PKI

             With the incredible growth of the Internet, there is an increasing need for entities
             (people, computers, or companies) to prove their identity.As the old New Yorker
             cartoon has it,“On the Internet, no one knows you’re a dog” - anyone can be sit-
             ting behind a keyboard at the other end of a transaction or communication, so
             who is responsible for verifying their credentials, and how can those credentials be
             reliably verified?
                 PKI was developed to solve this very problem.The PKI identification process is
             based on the use of unique identifiers known as keys. Each person using PKI cre-



          www.syngress.com
   569   570   571   572   573   574   575   576   577   578   579