CompTIA Security+
1 Threats, Attacks, and Vulnerabilities
1-1 Types of Threats
1-2 Types of Attacks
1-3 Vulnerabilities
1-4 Threat Actors and Motives
1-5 Threat Intelligence
1-6 Incident Response
1-7 Penetration Testing
1-8 Vulnerability Scanning
1-9 Threat Modeling
1-10 Security Controls
2 Technologies and Tools
2-1 Firewalls
2-2 Intrusion Detection Systems (IDS)
2-3 Intrusion Prevention Systems (IPS)
2-4 Security Information and Event Management (SIEM)
2-5 Data Loss Prevention (DLP)
2-6 Security Orchestration, Automation, and Response (SOAR)
2-7 Endpoint Security
2-8 Network Security
2-9 Cloud Security
2-10 Mobile Device Security
2-11 Secure Coding Practices
2-12 Cryptography
2-13 Public Key Infrastructure (PKI)
2-14 Certificate Management
2-15 Security Tools and Utilities
3 Architecture and Design
3-1 Security Models
3-2 Security Controls
3-3 Secure Network Design
3-4 Secure Systems Design
3-5 Secure Application Design
3-6 Secure Cloud Architecture
3-7 Secure Mobile Architecture
3-8 Secure IoT Architecture
3-9 Secure Data Storage
3-10 Secure Backup and Recovery
3-11 Security in DevOps
3-12 Security in Agile Development
3-13 Security in Continuous IntegrationContinuous Deployment (CICD)
3-14 Security in Configuration Management
3-15 Security in Identity and Access Management (IAM)
4 Identity and Access Management
4-1 Authentication Methods
4-2 Authorization Mechanisms
4-3 Identity and Access Management (IAM) Concepts
4-4 Single Sign-On (SSO)
4-5 Multi-Factor Authentication (MFA)
4-6 Federation
4-7 Role-Based Access Control (RBAC)
4-8 Attribute-Based Access Control (ABAC)
4-9 Identity as a Service (IDaaS)
4-10 Identity Lifecycle Management
4-11 Access Reviews and Audits
4-12 Privileged Access Management (PAM)
4-13 Identity Federation
4-14 Identity Provisioning and Deprovisioning
5 Risk Management
5-1 Risk Management Concepts
5-2 Risk Assessment
5-3 Risk Mitigation Strategies
5-4 Business Impact Analysis (BIA)
5-5 Risk Register
5-6 Risk Treatment
5-7 Risk Monitoring and Reporting
5-8 Risk Appetite and Tolerance
5-9 Risk Communication
5-10 Risk Transfer
5-11 Risk Acceptance
5-12 Risk Avoidance
5-13 Risk Reduction
5-14 Risk in Cloud Environments
5-15 Risk in Mobile Environments
5-16 Risk in IoT Environments
6 Cryptography and PKI
6-1 Cryptographic Concepts
6-2 Symmetric Encryption
6-3 Asymmetric Encryption
6-4 Hashing
6-5 Digital Signatures
6-6 Public Key Infrastructure (PKI)
6-7 Certificate Management
6-8 Certificate Authorities (CAs)
6-9 Certificate Revocation
6-10 Key Management
6-11 Cryptographic Protocols
6-12 Cryptographic Attacks
6-13 Quantum Cryptography
6-14 Post-Quantum Cryptography
6-15 Cryptographic Use Cases
7 Security Operations
7-1 Security Operations Concepts
7-2 Security Policies and Procedures
7-3 Security Awareness and Training
7-4 Security Monitoring and Logging
7-5 Incident Response
7-6 Forensics
7-7 Disaster Recovery
7-8 Business Continuity
7-9 Physical Security
7-10 Personnel Security
7-11 Supply Chain Security
7-12 Third-Party Risk Management
7-13 Security Audits and Assessments
7-14 Compliance and Regulatory Requirements
7-15 Security Metrics and Reporting
7-16 Security Operations Center (SOC)
7-17 Security Orchestration, Automation, and Response (SOAR)
7-18 Security in DevOps
7-19 Security in Agile Development
7-20 Security in Continuous IntegrationContinuous Deployment (CICD)
2.13 Public Key Infrastructure (PKI) Explained

2.13 Public Key Infrastructure (PKI) Explained

Key Concepts

Public Key Infrastructure (PKI) is a framework that enables secure communication over an insecure network, such as the internet. It involves the use of digital certificates, public and private keys, and a Certificate Authority (CA) to verify the identity of entities and ensure the integrity and confidentiality of data.

Digital Certificates

Digital certificates are electronic documents that bind a public key to an entity, such as a person, organization, or device. They are issued by a Certificate Authority (CA) and contain information about the certificate holder, the public key, and the CA's digital signature. Digital certificates ensure that the public key belongs to the entity it claims to belong to.

Example: Think of a digital certificate as a driver's license. The license contains your name, photo, and other identifying information, and is issued by a trusted authority (the Department of Motor Vehicles). Similarly, a digital certificate contains the identity of the certificate holder and is issued by a trusted CA.

Public and Private Keys

Public and private keys are cryptographic keys used in asymmetric encryption. The public key is shared openly and is used to encrypt data, while the private key is kept secret and is used to decrypt the data. The private key also serves to sign digital documents, providing a means of verifying the authenticity and integrity of the document.

Example: Consider a mailbox with a lock. The mailbox has a public key (the lock) that anyone can use to send a letter (encrypt data). However, only the owner of the mailbox has the private key (the key to the lock) to open the mailbox and read the letter (decrypt data).

Certificate Authority (CA)

A Certificate Authority (CA) is a trusted entity that issues digital certificates. The CA verifies the identity of the certificate holder before issuing a certificate. The CA's digital signature on the certificate ensures that the certificate is authentic and has not been tampered with.

Example: Think of a CA as a notary public. The notary public verifies your identity and signs a document to confirm that you are who you claim to be. Similarly, a CA verifies the identity of the certificate holder and signs the digital certificate to confirm its authenticity.

Certificate Revocation

Certificate revocation is the process of invalidating a digital certificate before its expiration date. Certificates may be revoked if the private key is compromised, the certificate holder's identity is no longer valid, or the certificate is no longer needed. Certificate Revocation Lists (CRLs) and Online Certificate Status Protocol (OCSP) are used to check the status of a certificate.

Example: Consider a passport that is revoked by the issuing authority. The passport is no longer valid for travel, and the authority maintains a list of revoked passports. Similarly, a CA maintains a list of revoked certificates (CRL) and provides a way to check the status of a certificate (OCSP).

Conclusion

Public Key Infrastructure (PKI) is essential for secure communication over the internet. By using digital certificates, public and private keys, and a trusted Certificate Authority, PKI ensures the authenticity, integrity, and confidentiality of data. Understanding these concepts is crucial for anyone working in cybersecurity.