O'Reilly logo

CompTIA Security+ All-in-One Exam Guide, Third Edition by Chuck Cothren, Roger Davis, Dwayne Williams, Gregory White, Wm. Arthur Conklin

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter Review

Chapter 5 discussed the various components of a public key infrastructure (PKI). This chapter continued the discussion with the many different standards and protocols that have been implemented to support PKI. Standards and protocols are important because they define the basis for how communication will take place. Without these protocols, two entities may each independently develop their own methods for implementing the various components for a PKI, as described in Chapter 5, and the two will not be compatible. On the Internet, being incompatible and unable to communicate is not an option.

Three main standards have evolved over time to implement PKI on the Internet. Two are based on a third standard, the X.509 standard, and establish ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required