Public Key Infrastructure (PKI)
GPTKB entity
Statements (94)
Predicate | Object |
---|---|
gptkbp:instance_of |
gptkb:infrastructure
|
gptkbp:behavior |
social engineering attacks
poor key management |
gptkbp:can_be_used_for |
secure email
secure web browsing secure file transfer secure access control |
gptkbp:components |
identity management systems
cybersecurity frameworks access management systems |
gptkbp:deployment |
cloud environments
enterprise environments government environments |
gptkbp:enables |
secure communication
|
gptkbp:facilitates |
secure email
secure file transfer secure access control |
gptkbp:governed_by |
policies and standards
|
https://www.w3.org/2000/01/rdf-schema#label |
Public Key Infrastructure (PKI)
|
gptkbp:includes |
Certificate Authorities (CAs)
Registration Authorities (RAs) |
gptkbp:is_a_framework_for |
data protection
secure communications secure transactions digital identity management secure data exchange secure access management secure identity verification |
gptkbp:is_a_solution_for |
secure data exchange
trust establishment secure identity verification |
gptkbp:is_based_on |
trust models
|
gptkbp:is_critical_for |
cybersecurity
regulatory compliance data privacy |
gptkbp:is_essential_for |
data integrity
identity verification non-repudiation secure web applications e-commerce security healthcare data security VPN security government digital services online banking security Io T security |
gptkbp:is_implemented_in |
gptkb:Software_Solutions
gptkb:cloud_services enterprise environments government environments hardware security modules (HSMs) |
gptkbp:is_maintained_by |
system administrators
|
gptkbp:is_managed_by |
PKI administrators
|
gptkbp:is_part_of |
gptkb:crypt
digital identity management secure communications protocols |
gptkbp:is_related_to |
gptkb:crypt
encryption identity management network security decryption key exchange |
gptkbp:is_supported_by |
gptkb:Software_Solutions
standards organizations industry best practices hardware security modules (HSMs) |
gptkbp:is_used_for |
gptkb:Linux
secure transactions code signing |
gptkbp:is_used_in |
gptkb:SSL/_TLS
VPNs digital signatures code signing email encryption |
gptkbp:is_vulnerable_to |
man-in-the-middle attacks
certificate spoofing |
gptkbp:manages |
private keys
public keys |
gptkbp:provides |
digital certificates
|
gptkbp:requires |
gptkb:Online_Certificate_Status_Protocol_(OCSP)
key management certificate revocation lists (CRLs) key management practices trust models |
gptkbp:supports |
data integrity
encryption authentication digital signatures non-repudiation |
gptkbp:uses |
gptkb:crypt
asymmetric cryptography |
gptkbp:bfsParent |
gptkb:crypt
gptkb:Certification gptkb:security_services |
gptkbp:bfsLayer |
4
|