220 likes | 405 Views
Public Key Infrastructure. Ammar Hasayen 2013 . …. Going back in time. How things worked before. Face to Face. Paper work. Trust. Delivery. Badges. Authenticity. Corporate walls. Confidentiality. How things working Now. Virtual Team. Digital Collaboration. Wireless.
E N D
Public Key Infrastructure Ammar Hasayen2013
…. Going back intime
How things worked before Face to Face Paper work Trust Delivery Badges Authenticity Corporate walls Confidentiality
How things working Now Virtual Team Digital Collaboration Wireless E-transactions Digital ID BYOD World is the limit Anywhere
Defining Challenges Within Corporate Can be shared C.I.A Weak Identity How to identify people digitally? Active Directory You can be anyone Internet is like a big city
…. IntroducingPKI
Public Key Infrastructure Authenticity Non-Repudiation Confidentiality Integrity Public Key Technology People Policies Software Hardware Processes Framework Public Key Infrastructure is a framework consist of hardware, software, people, processes, and policies, that together helps identify and solve these problems for you by establishing safe and reliable environment for electronic transactions in the internet
Digital Certificate Digital Certificate Certificate Authority A certificate authority maintains a revocation list that contains all digital certificates cancelled or suspended before their expiry dates.
Digital Certificate Public Key Digital Certificate Private Key
Secure Email Encrypt with Public Key Decrypt with Private Key
…. Why PKI
Starts at 1024 bit key length Asymmetric cryptography Users, Computers, Devices, Portals Authenticity, Integrity, Confidentiality Non Repudiation (Proof)
Can be hosted in Smart Cards Extend trust beyond Corp boundaries Secure Technology Enabler Compliance Technology Neutral
…. PKI Technologies
Public Key Infrastructure Secure Email S/MIME Encrypt Files EFS Smart Cards Two-factor Authentication SSL Certificates Wireless Security PEAP –EAP-TLS Secure VPN Access
Public Key Infrastructure is Enabler For Every Security Solution
…. PKI Deployment
PHASE 3 NAP 802.1X Smart Cards Secure VPN EFS S/MIME SSL TLS Introducing PKI Technologies PHASE 2 Devices Services Users Computers Defining Enrollees PHASE 1 Policies (CPS, CS) Secure PKI and defining roles Configuration (CRLS,AIA) Implement CA Servers Design PKI Infrastructure
It is either your infrastructure that determines your service levelORyour service level determines your infrastructure