Chapter Review

Chapter 5 discussed the various components of a public key infrastructure (PKI). This chapter continued the discussion with the many different standards and protocols that have been implemented to support PKI. Standards and protocols are important because they define the basis for how communication will take place. Without these protocols, two entities may each independently develop their own methods for implementing the various components for a PKI, as described in Chapter 5, and the two will not be compatible. On the Internet, being incompatible and unable to communicate is not an option.

Three main standards have evolved over time to implement PKI on the Internet. Two are based on a third standard, the X.509 standard, and establish ...

Get CompTIA Security+ All-in-One Exam Guide (Exam SY0-301), 3rd Edition, 3rd Edition now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.