Following is a list of general security concepts and their associated definitions that you need to know.
Concept Name
| Definition
|
Authentication
| The recipient of an authenticated message can be certain of the message's
origin (its sender). Authentication reduces the possibility that another person has
impersonated the sender of the message.
|
Authorization
| The set of privileges available to an authenticated entity.
|
Certificate
| A certificate is created when an entity's public key is signed by a trusted
identity: a certificate authority. The certificate ensures that the entity's
information is correct and that the public key actually belongs to that entity.
|
Certificate Authority
| An application that creates public key certificates.
|
Confidentiality
| A function of cryptography. Confidentiality guarantees that only the intended
recipient(s) of a message can view the message (decrypt the ciphertext).
|
Cryptography
| The act of writing and deciphering secret code resulting in secure messages.
|
Decryption
| The process of converting the contents of an encrypted message (ciphertext)
back into its original readable format (plaintext).
|
Digital Signature
| A digital signature is created when a public key algorithm is used to sign the
sender's message with the sender's private key. The digital signature assures
that the document is authentic, has not been forged by another entity, has not
been altered, and cannot be repudiated by the sender.
|
Encryption
| The process of disguising the contents of a message and rendering it
unreadable (ciphertext) to anyone but the intended recipient.
|
Identity
| A user who is typically certified.
|
Integrity
| The guarantee that the contents of the message received were not altered from
the contents of the original message sent.
|
Non-repudiation
| Undeniable proof of the origin, delivery, submission, or transmission of a
message.
|
Public-Key Encryption
| The process where the sender of a message encrypts the message with the public
key of the recipient. Upon delivery, the message is decrypted by the recipient
using the recipient's private key.
|
Public/Private Key Pair
| A mathematically related set of two numbers where one is called the private
key and the other is called the public key. Public keys are typically made widely
available, while a private key is available only to the owner. Data encrypted
with a public key can only be decrypted with its corresponding private key and
vice versa. However, data encrypted with a public key cannot be decrypted with
the same public key.
|
Trusted Certificate
| A trusted certificate is a third party identity that is qualified with a level
of trust. The trusted certificate is used when an identity is being validated
as the entity it claims to be. The certificate authorities you trust are the
issuers of trusted certificates.
|
Wallet
| A wallet is an abstraction used to store and manage security credentials for
an individual entity. It implements the storage and retrieval of credentials for
use with various cryptographic services. A wallet resource locator (WRL)
provides all the necessary information to locate the wallet.
|
Wallet Resource Locator
| A directory path that provides all the necessary information to locate a
particular wallet.
|
WRL
| See Wallet Resource Locator.
|
X.509
| The public keys can be signed in various data formats. The X.509 format from
ISO is one such popular format.
|