Private keys are widely used in Linux systems to protect conversations, and to encrypt/decrypt content. SSH and PGP are two examples of tools that make use of public/private keypairs to provide authentication, session encryption, and content encryption. SSH private keys are used to establish remote shell connections, create secure tunnels, perform secure file transfers, and a wide variety of related functions. PGP private keys are used to encrypt sensitive files, and to encrypt email content.
Keys are often stored insecurely, and unauthorized key disclosure presents a significant risk to the security of any system, or encrypted data.
In this on-demand webinar, security expert, Gary Patterson, who will walk attendees through the: