|
|
|
|
|
Access Control The
process of ensuring that systems are accessed only by those
authorized to do so, and only in a manner for which they have been
authorized.
Algorithm An algorithm
is a set of rules that specifies a method of carrying out a task
(e.g., encryption algorithm).
Archive To store records
and associated journals for a given period of time for security,
backup, or auditing purposes.
Audit Logs All
significant transactions that are recorded in audit logs. Audit logs
are valuable because they record all significant operations.
Authentication The
process of assuring that data has come from its claimed source, or
of corroborating the claimed identity of a communicating party. Certificates are used to identify the author of a
message or entity, such as a Web server or client. People or
applications who receive a certificate can verify the identity of
the certificate's owner and the validity of the certificate. This
process is known as authentication.
Authorization Determining whether a subject
is trusted for a given purpose. |
|
|
|
|
Backup A copy of
computer data that is used to recreate data that has been lost,
mislaid, corrupted, or erased.
Browser A client program
that is used to look at various kinds of Internet
resources. |
|
|
|
|
Certification Authority
(CA) An entity that issues and manages certificates
within a PKI.
CA certificate A
certificate that identifies a CA. When a CA issues a certificate to
a client, a server, or other entity, the certificate is signed by
the CA's private key. The signature can be verified using the public
key in the CA's certificate.
Certificate A digital
identifier linking an entity and a trusted third party able to
confirm the entity's identity. It is used to verify the identity of
an individual, organization, or Web server, and to ensure
non-repudiation in business transactions. Three major kinds of
certificates are used in a PKI: CA certificates, server
certificates, and end-entity certificates.
Certificate Revocation List
(CRL) An enumeration of certificates that have been
revoked by a particular CA. CRLs can be used to check the status of
certificates offline.
Certificate Serial
Number A value that unambiguously identifies a certificate
generated by a CA.
Certification Authority
(CA) A trusted entity issuing certificates and confirming
the identity of, or given facts about, the certificate's subject.
Client (servers) A
machine that retrieves information from a server.
Compromise A violation
(or suspected violation) of a security policy, in which an
unauthorized disclosure of, or loss of control over, sensitive
information may have occurred (see Data Integrity). The loss of a
key through noncryptanalytic means.
Confidentiality The
process of ensuring that data is not disclosed to those not
authorized to see it. Also known as secrecy.
Cryptography The art or
science of transforming clear, meaningful information into an
enciphered, unintelligible form using an algorithm and a key.
Customer The customer is
any person authorized by a data owner to read, enter, or update that
person's data. |
|
|
|
|
Data Integrity Measures
to prevent unauthorized alteration of data, deciphering, or
conversion of ciphertext back into plaintext.
Database A set of
related information created, stored, or manipulated by a
computerized management information system.
Decrypt To decrypt a
protected file is to restore it to its original, unprotected state.
Decryption Decryption is
the process of transforming ciphertext back into plaintext. It is
the reverse of encryption.
Digital Signature A data
element allowing the recipient of a message or transaction to verify
the content and sender.
Directory Databases that
can be used to search for and retrieve attribute-value pairs.
Directories can be configured to use (or support) authentication and
access control protection. The schema of a directory describes the
objects in the directory.
DST Digital Signature
Trust Co. Also refers to computing resources and computer-related
facilities specifically assigned by Digital Signature Trust Co. to
DST for operations and maintenance. |
|
|
|
|
Encrypt To encrypt a
file is to render the file completely unreadable. No one can read
the file until it is decrypted. Only authorized recipients can
decrypt the file. You (the key owner) have full control in
determining authorized recipients.
Encryption A process of
disguising information so that an unauthorized person cannot
understand it.
End-entity Certificate A
certificate issued to an entity that cannot itself issue
certificates (in essence, it is not a CA). Because the entity that
requests such a certificate is sometimes referred to as the client,
end-entity certificates are sometimes called client certificates.
Entity A person,
computer, organization, or piece of information. In a PKI, an entity
may be thought of as anything to which a certificate may be issued. |
|
|
|
|
Firewall A combination
of hardware and software that separates a LAN into two or more parts
for security purposes.
Frequently Asked Questions
(FAQ) FAQs are documents that list and answer the most
common questions on a particular subject. |
|
|
|
|
Generate a Key Pair A
trustworthy process of creating private keys whose corresponding
public keys are submitted to the applicable IA during certificate
application in a manner that demonstrates the applicant's capacity
to use the private key. |
|
|
|
|
Identification and Authentication
(I&A) A process that identifies and authenticates a
person or a business that applied to receive a digital certificate.
Identity Certificate A
certificate that links a public key value to a real world entity
such as a person, a computer, or a Web server. Server certificates,
CA certificates, and most end-entity certificates are all examples
of identity certificates.
Integrity The element of
data protection concerned with ensuring that data cannot be deleted,
modified, duplicated, or forged without detection.
Internet A global public
network consisting of millions of interconnected computers all
linked together using the Internet protocol.
Issuing The act of
signing a certificate request with the private key of a CA to create
a certificate. |
|
|
|
|
Key A special number
that an encryption algorithm uses to change data, making that data
secure.
Key Lifetime The length
of time for which a key is valid. All keys have a specific lifetime
except the decryption private key, which never expires. Default key
lifetimes are defined by Security Officers as part of an
organization's security policy.
Key
Management Administering keys securely so that they are
provided to users where and when they are needed. Processes
associated with the secure generation, transport, storage, and
destruction of encryption keys.
Key Recovery A key
management process associated with the retrieval of a key lost by
the keyholder to ensure access to ciphertext created with the key in
question.
Key Update When key
pairs are updated, they are replaced with the new key pairs, and new
public key certificates are created. The new keys and certificates
have no relation to the old keys and certificates.
Key When used in the
context of encryption, a series of numbers which are used by an
encryption algorithm to transform plaintext data into encrypted
(ciphertext) data, and vice versa. |
|
|
|
|
Lightweight Directory Access
Protocol (LDAP) The standard Internet protocol for
accessing directory systems over a network. LDAP is a "lightweight"
(smaller amount of overhead) version of DAP (Directory Access
Protocol), which is part of X.500, a standard for directory services
in a network. Sentry's Secure Directory is an LDAP directory.
Lightweight Directory Applications
Protocol The Internet standard for simple directories for
use in messaging and similar applications. |
|
|
|
|
National Institute of Standards
& Technology (NIST) The National Institute of
Standards and Technology (NIST) is taking a leadership role in the
development of a Federal Public Key Infrastructure that supports
digital signatures and other public key-enabled security services.
NIST is coordinating with industry and technical groups developing
PKI technology to foster interoperability of PKI products and
projects.
Netscape Communicator A
Web browser, widely recognized and popular. |
|
|
|
|
Out-of-band Not in the
electronic pipeline; any communication which is not
computer-to-computer.
Order Number A payment
mechanism for certificate purchase. See instructions
for submitting a purchase order (PO) to request a DST Order Number. |
|
|
|
|
Password A sequence of
characters which allows users access to a system. Although they are
supposed to be unique, experience has shown that most people's
choices are highly insecure. People tend to choose short words such
as names, which are easy to guess.
Personal Identification Number
(PIN) A sequence of digits used to verify the identity of
the holder of a token. It is a kind of password.
Policy An informal,
generally natural language description of desired system behavior.
Policies may be defined for particular requirements, such as
confidentiality, integrity, availability, safety, etc.
Portal The place people
see when using the Web.
Private Key The private
part of a key pair. With Sentry CA and Sentry RA, private keys are
generated on the client whenever a certificate request is made.
Private keys must be securely stored to prevent unauthorized access
and accidental deletion. In general, information encrypted with a
private key can only be decrypted with the corresponding public key.
A digital signature involves encrypting messages with a private key
and allows anyone with a corresponding public key to decrypt the
message to be certain of who sent the message and that it has not
been tampered with.
Protocol A series of
steps involving two or more parties designed to accomplish a task.
Public Key The public
and widely distributed part of a key pair. A cryptographic key
employed in public key cryptography to encrypt (usually small)
amounts of data to the key's owner, or to verify the key owner's
signature. A certificate contains information about the certificate
subject, the certificate's signer, and a public key value. In
general, information encrypted with a public key can only be
decrypted with the corresponding private key. It can be published
without revealing the owner's corresponding private key.
Public Key Algorithm An
asymmetric algorithm, so designed that the key used for encryption
is different from the key used for decryption.
Public Key
Cryptography A form of asymmetric encryption where all
parties possess a pair of keys, one private and one public, for use
in encryption and digital signing of data.
Public Key Cryptography Standard
(PKCS) A set of commonly applied data cryptography
standards developed by RSA Data Security Inc. for making secure
information exchange possible. The standards include RSA encryption,
password-based encryption, extended certificate syntax, and
cryptographic message syntax for S/MIME, RSA's proposed standard for
secure e-mail.
Public Key Infrastructure
(PKI) A system for publishing the public key values used
in public key cryptography. Also a system used in verifying,
enrolling, and certifying users of a security application. All PKIs
involve issuing public key certificates to individuals,
organizations, and other entities and verifying that these
certificates are indeed valid. |
|
|
|
|
Recovering a
User Recovering means generating a new signing key pair
and securely retrieving from the Certification Authority, your
current encryption public key certificate, decryption private key
history, verification public key certificate, and CA verification
public key certificate.
Registration Authority
(RA) The part of a PKI involved in verifying and enrolling
users. RAs work with a particular CA to vet requests for
certificates that will then be issued by the CA.
Repository A database of
certificates and other relevant information accessible online.
Repudiation The denial
or attempted denial by an entity involved in a communication of
having participated in all or part of the communication.
Revocation Revoking a
certificate makes the certificate invalid, effectively suspending
all of the certificate user's privileges in the PKI. Revocation is
necessary if the CA administrator wants to retract the certificate
before it expires. Certificates are revoked by marking them as
invalid in the Secure Directory. Users of the PKI are notified of a
certificate's revoked status during online validation or with CRLs.
Root The IA that issues
the first certificate in a certification chain. The root's public
key must be known in advance by a certificate issuer in order to
validate a certification chain. The root's public key is made
trustworthy by some mechanism other than a certificate, such as by
secure physical distribution.
Root CA The source CA is
a certification path. Generally, the Root CA is a self-signed CA
that is used to sign the certificates of other CAs. The Root CA may
also be referred to as a top-level CA to reflect the CA's position
in a hierarchical PKI.
RSA Keys The encryption
keys employed in the RSA cryptography system. |
|
|
|
|
Schema A schema
describes an object and its attributes in LDAP.
Secure Sockets Layer
(SSL) An encryption standard devised by Netscape
Communications for secure communication over the World Wide Web. SSL
is a protocol layer created by Netscape to manage the security of
message transmissions in a network. The "sockets" part of the term
refers to the sockets method of passing data back and forth between
client and server programs in a network or between program layers in
the same computer. Now in widespread use in all Web browsers. It is
about to be superseded by TLS, an open standard developed by the
IETF.
Secure/Multipurpose Internet Mail
Extensions (S/MIME) S/MIME is a specification for secure
electronic mail and was designed to add security to e-mail messages
in MIME format. The security services offered are authentication
(using digital signatures) and privacy (using encryption).
Security The quality or
state of being protected from unauthorized access or uncontrolled
losses or effects. Absolute security is impossible to achieve in
practice and the quality of a given security system is relative.
Within a state-model security system, security is a specific "state"
to be preserved under various operations.
Server A machine running
a service. A Web server provides a Web-based information service to
a community of machines. A computer, or a software package, that
provides a specific kind of service to client software running on
other computers.
Server Certificate A
certificate issued to a server. Servers present their certificates
to Web browsers so they can verify (authenticate) the identity of
the server. Server certificates are sometimes called SSL
certificates.
SHA-1 Secure Hash
Algorithm-a hash function first originated by the US National
Security Agency and National Institute of Standards and Technology.
Signer A person who
creates a digital signature for a message or a signature for a
document.
Smart Card A hardware
token that incorporates one or more integrated circuit (IC) chips to
implement cryptographic functions and that possesses some inherent
resistance to tampering. A plastic card (looks like a credit card)
with an embedded computer chip, used most widely in Europe. Many
countries use the smart card for pay telephones. There are also
smart credit cards and smart cash cards.
SSL Server
Authentication The process whereby a client application
authenticates a server by verifying the certificate chain presented
by the server during SSL operations.
Subscriber Agreement The
agreement executed between a subscriber and a CA for the provision
of designated public certification services in accordance with this
CPS. Test Certificate A certificate issued by a CA for the limited
purpose of internal technical testing. Test certificates may be used
by authorized persons only. |
|
|
|
|
Time Stamp A notion
that indicates (at least) the correct date and time of an action and
the identity of the person or device that sent or received the time
stamp.
Token A physical object,
often containing sophisticated electronics, which is required to
gain access to a system. Some tokens contain a microprocessor, and
are called intelligent tokens, or smart cards.
Trust A person or system
in which confidence or faith is placed.
Trusted Third
Party Someone other than the principals who are involved
in a transaction.
Type of Certificate The
defining properties of a certificate, which limit its intended
purpose to a class of applications uniquely associated with that
type. |
|
|
|
|
Uniform Resource Locator
(URL) A URL is used to specify the location and name of a
World Wide Web document, for example, http://www.trustdst.com.
Previously called Universal Resource Locator.
Universal Resource Locator
(URL) Same as Uniform Resource Locator.
User Any person
utilizing resources provided and maintained by Digital Signature
Trust Co. (DST). An authorized entity that uses a certificate. User
authentication Determining that a user truly is authentic. |
|
|
|
|
Validation The process
of verifying that a certificate is still valid. Validation can occur
online or through the use of CRLs. |
|
|
|
|
World Wide Web The whole
constellation of resources that can be accessed using Gopher, FTP,
HTTP, telnet, USENET, WAIS and some other tools. A hypertext-based,
distributed information system in which users may create, edit, or
browse hypertext documents. A graphical document publishing and
retrieval medium. A collection of linked documents that reside on
the Internet. |
|
|
|
|
X.509 The ITU
(International Telecommunications Union) standard for certificates.
X.509 v3 refers to certificates containing or capable of containing
extensions. Also an International Standards Organization (ISO)
standard that describes a basic electronic format for digital
certificates.
X.509 v3 Certificate
Extension The PKI suites used by DST support X.509 v3
certificate extensions including extensions for PKIX, SET, and SSL.
These extensions conform to the X.509 standard and specify
additional constraints or capabilities on the certificate
subject. |
|
|
|
|