Digital certificates, Computer Network Security

 

A Certificate presents an organization in an official digital form. This is same to an electronic identity card which serves the purpose of Identifying the owner of the certificate. This is done with authenticating the owner through trusted 3rd parties named the certificate authorities (CA) e.g. Verisign etc. The Authorities digitally signs these certificates. When the user represents the certificate the recipient checks it by using the digital signature.

Distributing the owner's public key to his/her users (or recipients of the message).The server certificates let visitors to your website interchange personal information like credit card number etc with the server with the confidence that they are interacting with intended site and not the rogue site impersonating the intended site.

 

 

Posted Date: 7/27/2012 6:07:16 AM | Location : United States







Related Discussions:- Digital certificates, Assignment Help, Ask Question on Digital certificates, Get Answer, Expert's Help, Digital certificates Discussions

Write discussion on Digital certificates
Your posts are moderated
Related Questions
Question: (a) What is Network Address Translation (NAT)? Why is it used? (b) Given a following information by your ISP about your newly acquired Frame Relay connection:

QUESTION: (a) Briefly explain the steps involved in Network Simplex Method. (b) What data structures you would expect in the Network Simplex Method. Show the data struct

UDP- DATAGRAM TRANSPORT SERVICE INTRODUCTION:  UDP is the one of the transport protocols in TCP/IP protocol suite. UDP protocol accepts applications on the computers to

(a) Describe how CSMA/CD operates and explain how Ethernet deals with collisions. (b) Describe how the subsequent protocols work: i. ARP ii. DHCP iii. DNS iv. SMTP (c) The

Secure Socket Layer (SSL) accepts a combination of asymmetric and symmetric (public-key) encryption to accomplish integrity, confidentiality, authentication and non-repudiation for

In the e-mail system, where the e-mail messages are saved and why? E-mail messages are saved in user’s private electronic mailbox. A mailbox refers to a local/domestic hard drive c

PARSING IPv6 HEADERS Base header is fixed in size i.e. 40 octets. NEXT HEADER field in the base header describe kind of header and it seems at end of fixed-size base header. S

Question: (a) Mention three limitations of a firewall. (b) Compare packet-filtering and proxy-base firewalls. Give advantages and drawbacks of both. (c) "Proxies eff

Question 1 Explain any two types of security policies Question 2 What is security attack? Explain with examples Question 3 Explain different characteristics that i

(a) Describe the concept of zero knowledge proofs. Give a practical example. (b) Explain how a one way hash function works. (c) What are message authentication codes? (d)