FUNDAMENTALS OF COMPUTER

COMPUTER THREATS SECURITY

TYPES OF NETWORK SECURITY

Question [CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
The process by which keys are managed by a third party, such as a trusted CA, is known as?
A
Key escrow
B
Key destruction
C
Key renewal
D
Key management
Explanation: 

Detailed explanation-1: -Key escrow (also known as a “fair” cryptosystem) is an arrangement in which the keys needed to decrypt encrypted data are held in escrow so that, under certain circumstances, an authorized third party may gain access to those keys.

Detailed explanation-2: -refers to a situation in which keys are managed by a third party, such as a trusted CA. Key escrow.

Detailed explanation-3: -Key escrow is a method of storing important cryptographic keys. Each key stored in an escrow system is tied to the original user and subsequently encrypted for security purposes. Much like a valet or coat check, each key is stored in relation to the user that leverages it, and then returned once queried.

Detailed explanation-4: -A certificate authority (CA) is a trusted entity that issues Secure Sockets Layer (SSL) certificates. These digital certificates are data files used to cryptographically link an entity with a public key.

Detailed explanation-5: -A common method to ensure the security and integrity of a root CA is to keep it in an offline state.

There is 1 question to complete.