Menu

1.7 Explain how cryptography and public key infrastructure (PKI) support security objectives and requirements.

Privacy and confidentiality requirements

Integrity requirements

Non-repudiation

Compliance and policy requirements

Common cryptography use cases

 Data at rest

 Data in transit

 Data in process/data in use

 Protection of web services

 Embedded systems

 Key escrow/management

 Mobile security

 Secure authentication

 Smart card

Common PKI use cases

 Web services

 Email

 Code signing

 Federation

 Trust models

 VPN

 Enterprise and security automation/orchestration