Ask a question from expert

Ask now

Digital Certificate Technology - Doc

10 Pages2598 Words295 Views
   

Added on  2020-01-16

Digital Certificate Technology - Doc

   Added on 2020-01-16

BookmarkShareRelated Documents
Surname 1Name:Instructor:Course:Date:Digital Certificate TechnologyIntroductionDigital certificates authenticate the web credentials of the person sending a message and let the recipient of the message to be in a position to know that the message has come from a trusted source. Thus, digital certificate allows computers, organization as well as people to exchange information securely using the Public Key Infrastructure (PKI). Digital certificates technology thus plays a significant role in security to the Internet. Security on the internet is veryimportant since it provides confidentiality of information, authentication, non-repudiation, integrity and access control of the information already sent (Henderson et al., 6). However, digital certificate technology has been faced with several drawbacks. With the development of networks, antivirus software and firewalls have been standard measures for security. However, using these measures of security, sometimes it cannot prevent attacks from unauthorized people using the internet.
Digital Certificate Technology - Doc_1
Surname 2Digital Certificate TechnologyDigital certificate and digital signatures are made to be effective using the Public Key Infrastructure scheme (PKI) so as to eliminate the risks such as forging of document or sending irrelevant message to an individual. They provide identification information that prevents any falsification whereby they provide authentication of the information and in case of any verification it can be verified easily since the certificate is issued by a trusted agency the certification authority (CA) .The PKI ensures a safe and secure transaction between two counterparts in internet network (Le & Eric , 19). This security is ensured by the PKI even when there are many users in the internet who are transacting a variety of information and data to various people and organizations. The browsers and the operating systems can send the already sent public keys and the encrypted messages back to the sender since it contains symmetric key that is used to encrypt theattachment that has the identifying data to various recipients simultaneously. A root certificate authority signs the documents using the public and private keys to provide the evidence that the certificate is genuine and valid. Public keys are embedded in browsers and client internet software, and they are currently found on any modern computer. The public key and private key can be used to sign into any program that is used in an organization to ensure that anyone using itsuch as downloading software can be verified.In digital certificates technology, if security is not properly maintained its consequences can be disastrous to the individual or the organization using the internet since its information can be accessed by an unauthorized person. Criminals can create websites that are fraudulent and appear to originate from the original user and use it to fraud money to people connected to the
Digital Certificate Technology - Doc_2
Surname 3organization. They can create malware that is addressed to a wrong address, and they can steal details of credit cards or other information that is vulnerable and crucial whereby the can use it tosteal money. Ways Digital Certificates has Compromised SecurityThe risks associated with using digital certificates that are weak have been widely a matter of discussion. Numerous tools have been released in the digital market to exploit and deal with these vulnerabilities. There has been malware that has been developed to support the efforts of ensuring that software developed is genuine and of the right standard. Through the software vulnerability, there have been many malware authors and advanced hackers who create fake certificates and encourage the users to communicate and they steal their personal data. Enterprises and organizations should learn about the dangers that are associated with the use of insecure digital certificates and ways in which they can use to deal with them.Digital certificates do not necessarily mean that the identity of the party has been verified, some documents such as banknotes that have signatures can easily be duplicated through digital data ( Akehurst-ryan et al., 8). Therefore, identifying the data from the possession of it does not guarantee that it comes from a trusted source. To determine whether it comes froma trusted source, one must use the digital certificate and signature that is created using private keys. The certificate is equivalent to a document that relates an owner to a public key. These certificates are issued by a Certificate Authority (CA) that is a trusted third party. It is trusted since it is recognized by both the parties communicating.
Digital Certificate Technology - Doc_3

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Introduction to Information Assurance Assignment 2022
|5
|716
|15

Network Security in SSL Communication
|12
|1639
|396

Public Key Infrastructure and its Applications
|7
|850
|274

Public Key Infrastructure
|4
|721
|101

The authentication of e-commerce website
|3
|392
|13

SSL/TLS VPN Technologies for Secure Network Connection
|8
|2000
|419