Preview

Digital Certificates Can They Be Trusted

Better Essays
Open Document
Open Document
2214 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Digital Certificates Can They Be Trusted
Digital Certificates Can They Be Trusted

Table of Contents

Introduction We now live in a world where we as consumers are free to shop 24/7. The world wide web has given us greater access to consumer goods than ever before. As more and more purchases are taking place virtually, where there is no face to face interaction between a buyer and a seller, the need to ensure that online transactions have been made securely is vital to the online shopping community. For e-commerce to prosper, consumers must have absolute confidence that when they pay for goods or services online that the confidential information that they are entering will not be stolen or used maliciously. The use of digital certificates and the public key infrastructure (PKI) has emerged as the de facto standard for conducting secure transaction over the public internet. It has become increasing clear that the security infrastructure on which most of e-commerce is based is actually quite fragile. This paper will focus on the framework surrounding the usage of digital certificates and some of the security issues that have recently emerged.
Background
Most consumer business that is conducted online is made through the use of a web browser. Some of the top browsers currently on the market are Google Chrome, Mozilla Firefox, Microsoft Internet Explorer, Apple Safari and Opera. In an e-commerce application, the browser will need to make a secure connection to the web server so that the consumer’s private and financial data will not be stolen. Cryptographic techniques are used to ensure that even if a message was intercepted by an adversary the information contained the message would be indecipherable. The PKI is what allows users of the public internet to make secure transactions through the use of public/private key pairs, digital certificates and certificate authorities.
Public and Private Keys Digital certificates make use of asymmetric public and private key pairs. This



Cited: 1. White, Bill, Mike Ebbers, Demerson Ciloti, and Gwen Sandra. IBM z/OS V1R11 Communications Server TCP/IP Implementation Volume 4: Security and Policy-Based Networking. N.p.: IBM Redbooks, 2011. 39-40. 2. Schwartz, Mathew J. “Are Digital Certificates Doomed?”. InformationWeek, 6 Sept. 2011. Web. 20 Sept. 2013. . 3. Constantin, Lucian. “One year after DigiNotar breach, Fox-IT details extent of compromise”. Computerworld, 31 Oct. 2012. Web. 19 Sept. 2013. . 4. Wheatman, Vic, and Eric Ouellet. “Certificate Authority Breaches Impact Web Servers, Highlighting the Need for Better Controls”. Gartner, 18 Oct. 2011. Web. 25 Sept. 2013. .

You May Also Find These Documents Helpful

  • Satisfactory Essays

    Nt1310 Unit 8 Lab 1

    • 421 Words
    • 2 Pages

    Designing CA infrastructure – establishing a framework of linked CAs that are responsible for issuing, validating, renewing and revoking certificates as needed.…

    • 421 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Unit 2 Assignment 2

    • 676 Words
    • 3 Pages

    2. We have identified a vulnerability in the Internet Public Key Infrastructure (PKI) used to issue digital certificates for secure websites. As a proof of concept we executed a practical attack scenario and successfully created a rogue Certification Authority (CA) certificate trusted by all common web browsers. This certificate allows us to impersonate any website on the Internet, including banking and e-commerce sites secured using the HTTPS protocol.…

    • 676 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    Riordan Security Issues

    • 1371 Words
    • 6 Pages

    Palmer, M. (2003). Guide to Operating Systems Security. [University of Phoenix Custom Edition e-Text]. , : Course Technology. Retrieved September 21, 2009, from University of Phoenix, CMGT440.…

    • 1371 Words
    • 6 Pages
    Powerful Essays
  • Better Essays

    E-commerce networks are prone to external attacks. They present large targets with valuable internal data, such as customer information, credit card numbers and bank accounts, supply chain information, pricing, and so on. They must allow legitimate, worldwide users to connect and interact with the network. Speed is a priority to end users, where long transaction times or slow site navigation will motivate them to move to a different vendor. Security is another priority. Customers must be assured that their privacy and confidential information will remain intact and guarded.…

    • 890 Words
    • 4 Pages
    Better Essays
  • Powerful Essays

    Mallery, J., Zann, J., Kelly, P., Noonan, W., Seagren, E., Love, P., et al. (2005). Hardening Network Security. New York, NY: McGraw-Hill.…

    • 2643 Words
    • 11 Pages
    Powerful Essays
  • Satisfactory Essays

    E-Business is much more than just a shopping website. It expands individual’s knowledge and vision of the organization, gains new customers and evaluates the relevance of the products and personal preference of the clients. Safety and security is always necessary to protect intellectual properties and customers privacy. E-Business organizations use the best technology in order to grow and create strategies to maintain affordable prices.…

    • 423 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Exam Final ECOM 320

    • 3983 Words
    • 11 Pages

    Lesson 7: E-commerce security and controls Access control: Mechanism that determines who can legitimately use a network resource. Active tokens: Access token Authentication: Process to verify the real identify of an individual, computer, computer program, or EC website. Authorization: Determines whether a buyers card is active and whether the customer has sufficient funds. Biometric systems: Authentication systems that identify a person by measurement of biological characteristic, such as fingerprints, iris patterns, facial features, or voice. Biometric control: An automated method for verifying the identity of a person based on physical or behavioral characteristics. Botnet: A huge number of hijacked Internet computers that have been set up to forward traffic, including spam and viruses, to other computers on the Internet. Business continuity plan: A plan that keeps the business running after a disaster occurs. Each function in the business should have a valid recovery capability plan. Certificate authority (CA): Third parties that issue digital certificates. Ciphertext: a plaintext message after it has been encrypted into a machine-readable form. Confidentiality: Assurance data privacy and accuracy. Keeping private or sensitive information from being disclosed to unauthorized individuals, entities, or processes. Cybercrime: Intentional crimes carried out on the Internet. Cybercriminal: A person who intentionally carries out crimes over the Internet. Crackers: A malicious hacker who may represent a serious problem for a corporation. Cryptography: is a method of storing and transmitting data in a particular form so that only those for whom it is intended can read and process it. Data breach: A security incident in which sensitive, protected, or confidential, data is copied transmitted, viewed, stolen, or used by an individual unauthorized to do so. Denial-of-service (DoS) attack: An attack on a website in which an attacker uses specialized software to send a…

    • 3983 Words
    • 11 Pages
    Powerful Essays
  • Better Essays

    Dougherty, C., Householder, A., & Houle, K. (2002). Computer attack trends challenge Internet security. Computer, 35(4), 0005-7.…

    • 1278 Words
    • 5 Pages
    Better Essays
  • Good Essays

    In this document I am going to explain the security issues that every e-commerce possible faces and how to overcome them.…

    • 646 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Cac Card

    • 1716 Words
    • 7 Pages

    Public key infrastructure (pki) certificates that enable cardholders to "sign" documents digitally, encrypt and decrypt emails, and establish secure online network connections.…

    • 1716 Words
    • 7 Pages
    Good Essays
  • Good Essays

    Public key infrastructure is becoming an integral and essential element of security these days. It provides highly secure enterprise systems in companies that provide large scale rankings of data that need to be encrypted to improve security levels. With the public key infrastructure, we want to retrieve digital certificates and set up practices, ways and policies to encrypt data. Provides access to secure data exchange or networking through networks and provides access to authentication and verification. We can refer to it as an infrastructure that distributes public keys. Data Center Basics (2003).…

    • 601 Words
    • 3 Pages
    Good Essays
  • Best Essays

    McClure, S., Scambray, J., & Kurtz, G. (2009). Hacking exposed 6: Network security secrets & solutions. New York: McGraw-Hill.…

    • 4737 Words
    • 19 Pages
    Best Essays
  • Good Essays

    There are many security challenges associated with digital signatures. E-Government security and e-business is implemented legally as well as practically by CryptBot e-sign. The security is planned to secure all email sending, encrypting, digitally signing, decrypting and storing and gathering all types of data in the way to authenticate. This works to maintain privacy and avoid rejection by the signer.…

    • 782 Words
    • 4 Pages
    Good Essays
  • Good Essays

    This essay will discuss the reason why digital revolution can be considered as a wicked problem with respect to the 10 key characteristics of wicked problem, which is listed by professor Horst and Melvin (Camillus 2008). In addition, it will also demonstrate whether digital divide is an opportunity or issue for business.…

    • 699 Words
    • 3 Pages
    Good Essays
  • Good Essays

    When an organization uses and relies on computer systems and information technology to assist in running their company(s) and also uses these resources to store important, personal information about clients, customers, employees, and the organization itself, it is important to have the adequate security protection in place to prevent this information from being compromised. The following summary will discuss how IBM prevents security breaches by using technology to reduce the rampant crime committed against them.…

    • 555 Words
    • 3 Pages
    Good Essays