Public Key Infrastructure
Title: Public Key Infrastructure
Category: /Literature/English
Details: Words: 3243 | Pages: 12 (approximately 235 words/page)
Public Key Infrastructure
Category: /Literature/English
Details: Words: 3243 | Pages: 12 (approximately 235 words/page)
E-Commerce
Public Key Infrastructure
Prepared By:
Imran Patel
Preston University
Table of Contents
1 Introduction 2
2 Electronic Security: Key Concepts 2
3 Common Security Risks 3
4 Common Safeguards 3
5 Cryptography 4
6 "Key"-based encryption 4
7 Digital Signatures 4
8 Digital Certificates for Authentication 5
9 Overview of Digital Certificates 5
9.1 Digital ID Usage 6
9.2 Subject Authentication 6
9.3 The X.509 Certificate Format 6
10 Certificate Distribution 7
11 Maintaining Control of Certificate Management 7
12 Authentication Protocols 7
13 Passwords and PINs 7
14 Internet Messaging Security 8
14.1 MIME and S/MIME 8
14.2 Secure Sockets Layer (SSL) 8
14.3 Secure HTTP (S-HTTP) 9
15 Electronic Commerce Application
showed first 75 words of 3243 total
You are viewing only a small portion of the paper.
Please login or register to access the full copy.
Please login or register to access the full copy.
showed last 75 words of 3243 total
digital certificates--it is now possible to absolutely, positively verify the source and recipient of electronic information while also maintaining privacy and confidentiality.
As a result, companies can now create secure intranet and extranet applications, secure business-to-business services such as EDI, secure departmental applications such as MRP and ERP, and secure email systems. These capabilities in turn translate to new sources of revenue, higher employee productivity, and the ability to create competitive advantages in the marketplace.