Submitted by: Submitted by chaz7711
Views: 65
Words: 1134
Pages: 5
Category: Other Topics
Date Submitted: 10/08/2014 09:17 PM
Course Project II
SEC-577-60659 Crypto and Security Mechanisms
August 22 2014
Charles McComb
This is the second of the security briefing for the company. Again this is come in a PowerPoint Presentation and Word Document
Public Key Infrastructure (PKI): is the policies, procedures also with the hardware and software, needed to manage, distribute digital certificates created and the ones that needs to be revoked. This is the basic system that credit cards use when doing business.
Public Key Infrastructure is:
1. Certificate authority use to verifies and issue digital certificates
2. Central directory a secure location used to house and index keys
3. Registration authority, verifies the identity of users
4. Certificate policies and procedures
5. Certificate management system (Wikipedia / July14, 2014)
Non-Repudiation: is a situation where one needs to make sure the sender is the sender and the receiver is the receiver and that the receiver got the message. This will also prove that the sender sent the message, so that the sender can prove they sent the message and that the receiver cannot say the message got lost and he never got the message.
Non-Repudiation created by the following:
1. Digital signatures:
2. Confirmation services:
3. Timestamps: (QuinStreet / 2014)
There are several ways to secure the information. The first is:
Secure Electronic Transaction (SET): is used to send financial information securely over Internet. Using Secure Electronic Transaction will allow one a digital certificate and the purchase is allowed and verified using the combined digital signatures and digital certificates among the customer, vendor and the bank in a way that ensures privacy and confidentiality.
Here's how Secure Electronic Transaction works:
1.The customer gets a credit card.
2.The customer receives a digital certificate. It includes a...