Section 8.75 Digital Certificates Flashcards

Objectives 1.4 Explain the importance of using appropriate cryptographic solutions. Objectives 2.3 Explain various types of vulnerabilities. Objectives 2.4 Given a scenario, you must be able to analyse indicators of malicious activity.

1
Q

Digital Certificate

A

Digitally signed electronic documents that binds public key with a users identity

Users can be individuals, servers, workstations, or devices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Digital Certificate

X.509 Standard

A

■ Use the X.509 Standard

Commonly used standard for digital certificates within PKI

Contains owner’s/user’s information and certificate authority details

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Types of Digital Certifactes

Wildcard Certificate

A

● Allows multiple subdomains to use the same public key certificate and have it displayed as valid

● PROs: Easier management, cost-effective for subdomains

● CONs: Any Compromise will affects all subdomains

Easy to get new wildcard certificates if compromised which is good

Online platforms that require an overhaul to perform well on mobile devices usually host their mobile sites under dedicated subdomains. For example, Facebook crafted a distinct interface for its mobile users under m.facebook.com. The company shaped the layout to fit a mobile device’s oblong shape.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Types of Digital Certifactes

SAN (Subject Alternate Name) field

A

Certificate that specifies what additional domains and IP addresses are going to be supported

● Used when domain names don’t have the same root domain

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Types of Digital Certifactes

Single-Sided and Dual-Sided Certificates

A

● Single-sided:
○ Only requires the server to be validated so only one side of authetication is happening.

e.g If I wanted to connect to another persons website and create a secure session. This could be established between the websites server which has the digital certificate and my browswer.e.g Public website)

● Dual-sided:
○ Both server and user validate each other e.g Banking / Government / Organisations

○ Dual-sided for higher security, requires more processing power so it used in high security environments

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Types of Digital Certifactes

Self-Signed Certificates

A

Digital certificate that is signed by the same entity whose identity it certifies

● Provides encryption but lacks third-party trust

● Used in testing or closed systems or non production systems (Internally used)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Types of Digital Certifactes

Third-party certificates

A

Digital certificate issued and signed by trusted certificate authorities (CAs)

● Trusted by browsers and systems
● Preferred for public-facing websites

High degree of trust for online transactions or encrypted communications and this makes third party certificates a preferred choice for any public facing websites or applications you may be hosting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Key concepts

Root of Trust

A

Each certificate is validated using the concept of a root of trust or the chain of trust

● Trusted by browsers and systems
● Preferred for public-facing websites

e.g Amazon or Google

like a family tree - succession of trust

The RoT is the first component in the chain of trust, and the trust in the RoT is inherited by the entire chain. If the RoT is compromised, the entire chain is contaminated

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Key concepts

Certificate Authority (CA)

A

Trusted third party that issues digital certificates therfore contains the CA’s name, digital signature, the serial number for the certificate, issue date, expiration date and the version of that certificate

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Key concepts

Registration Authority (RA)

A

Users needs to register for a CA via the RA. The RA will request identifying information from the user and forwards certificate request up to the CA to create a digital certificate for the user.

● Collects user information for certificates
● Assists in the certificate issuance process

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Key concepts

Certificate Signing Request (CSR)

A

A block of encoded text with information about the entity requesting the certificate

● Includes the public key
● Submitted to CA for certificate issuance
● Private key remains secure with the requester

How the process works:

A user or device sends a certificate request to the RA.

The RA verifies the requestor’s identity and authenticity using acceptable forms of identification.

If the request is authenticated, the RA generates a key pair and sends a CSR to the CA.

The CA issues a signed certificate to the RA, who then passes it on to the requesting user or device.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Key concepts

Certificate Revocation List (CRL)

A

● Maintained by CAs
● List of all digital certificates that the certificate authority has already revoked
● Checked before validating a certificate

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Key concepts

Online Certificate Status Protocol (OCSP)

A

● Determines certificate revocation status of any digital certificate using the
certificate’s serial number

● Faster but less secure than CRL

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Key concepts

OCSP Stapling

A

● Alternative to OCSP

● Allows the certificate holder to get the OCSP record from the server at regular intervals

● Includes OCSP record in the SSL/TLS handshake

● Speeds up the secure tunnel creation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Key Escrow Agents

A

● Securely store copies of private keys

● Ensures key recovery in case of loss

● Requires strong access controls

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Key Recovery Agents

A

● Specialised type of software that allows the restoration of a lost or corrupted key to be performed

● Acts as a backup for certificate authority keys

17
Q

Trust in Digital Certificates

A

■ Trust is essential in digital certificates

■ Compromised root CAs can impact all issued certificates

■ Commercially trusted CAs are more secure

■ Self-managed CAs must be vigilant against compromises