With a principal objective of enabling secure, convenient and efficient acquisition of public keys, __________ is the set of hardware, software, people, policies, and procedures needed to create, manage, store, distribute, and revoke digital certificates based on asymmetric cryptography.
a. Public Key Infrastructure (PKI)
b. Secure Socket Layer (SSL)
c. Digital Signature
d. Cybersecurity Framework