SlideShare a Scribd company logo
 A digital certificate is equivalent to an 
electronic id card. 
It serves two purposes: 
 To establish the identity of the owner of the 
certificate. 
 To distribute the owner's public key
Web Server Certificates: 
These are the electronic equivalent of a 
business license. 
It assures potential customers that the 
site they are visiting is a legitimate 
business.
Developer Certificates: 
These certificates enable developers to sign 
software and macros and deliver them safely to 
customers over the Internet. 
The customer can be confident that the 
software or macros are legitimate. 
Personal Certificates: 
These certificates secures e-mail 
conversations and access to corporate web 
servers.
Service Thawte Verisign 
Server 
certificates 
Initial server 
certificates 
$125 $349 
Server 
certificate 
renewal 
$100 $249 
Personal 
certificates 
Class1 Free $14.95 
Class2 $20 $14.95 
Developer 
certificates 
Initial certificate $200 $100 
Renewal $100 $400
How DCs Protect the Data 
1. Encryption & Digital Certificates are the solution for 
Internet Commerce. Used together, they protect your 
data as it travels over the Internet. 
2. Encryption is the process of using a mathematical 
algorithm to transform information into a format that 
can't be read (this format is called cipher text). 
Decryption is the process of using another algorithm 
to transform encrypted information back into a 
readable format (this format is called plain text). 
3. Digital Certificates are your digital passport, an 
Internet ID. They are verification of you who you are 
and the integrity of your data
Digital Certificates Protect & Secure: 
 Authentication: 
This is digital verification of who you are, much 
in the same way your driver's license proves 
your identity. It is very easy to send spoofed 
email. 
 Integrity: 
This is the verification that the data you sent 
has not been altered. When email or other data 
travels across the Internet, it routes through 
various gateways (way stations). It is possible 
for people to capture, alter, then resend the 
message.
 Encryption: 
This ensures that your data was unable to 
be read or utilized by any party while in transit. Your 
message is encrypted into incomprehensible gibberish 
before it leaves your computer. It maintains it 
encrypted (gibberish) state during it's travel through 
the Internet. It is not de-crypt until the recipient 
receives it. Because of the public-key cryptography 
used (discussed later) only the recipient can decipher 
the received message, no one else can.
Token verification: 
Digital tokens replace your password which 
can be easily guessed. Tokens offer a more secure 
way of access to sensitive data. The most 
common way to secure data or a web site is with 
passwords. Before anyone access the data, they 
are prompted with their user login id and 
password. However, this is easily cracked using 
various security software (such as Crack 5.0, etc.). 
Also, passwords can be found with other means, 
such as social engineering. Passwords are not 
secure. Token verification is more secure.
Requesting certificates 
Certificate Request 
 To get a certificate, you must send a certificate request to 
the CA. 
 It includes the following: 
1. The distinguished name of the owner (the user for 
whom the certificate is being requested). 
2. The public key of the owner. 
3. The digital signature of the owner.
Contents of a digital certificate : 
A certificate contains several pieces of 
information, including information about the owner of 
the certificate and the issuing CA. Specifically, a 
certificate includes: 
1. The distinguished name (DN) of the owner. A DN is a 
unique identifier, a fully qualified name including not 
only the common name (CN) of the owner, but the 
owner's organization and other distinguishing 
information. 
2. The public key of the owner.
3. The date on which the certificate was issued. 
4. The date on which the certificate expires. 
5. The distinguished name of the issuing CA. 
6. The digital signature of the issuing CA. (The 
message-digest function is run over all the 
preceding fields.)
Digital Certificates provide a way to authenticate 
communication on the Internet. They come in three 
flavors: personal, web server, and developer certificates. 
Personal certificates are primarily used for e-mail. 
Universal acceptance and widespread use will 
depend on the industry’s ability to communicate in 
understandable terms and the development of a true 
standard 
Four factors 
1. Cost 
2. Compatibility 
3. Perceived need 
4. Familiarity
Thank you

More Related Content

What's hot

Digital signature
Digital signatureDigital signature
Digital signature
Hossain Md Shakhawat
 
Digital signature
Digital signatureDigital signature
Digital signature
Abdullah Khosa
 
CYBER SECURITY : DIGITAL SIGNATURE,
CYBER SECURITY : DIGITAL SIGNATURE,CYBER SECURITY : DIGITAL SIGNATURE,
CYBER SECURITY : DIGITAL SIGNATURE,
ShivangiSingh241
 
Digital Signatures
Digital SignaturesDigital Signatures
Digital Signatures
Sumanth Paramesh
 
Digital Signature
Digital SignatureDigital Signature
Digital Signature
nayakslideshare
 
Digital signature
Digital signatureDigital signature
Digital signature
Praseela R
 
Digital signatures
Digital signaturesDigital signatures
Digital signatures
ReachLocal Services India
 
PKI by Tim Polk
PKI by Tim PolkPKI by Tim Polk
Seminar presentation on digital signature ppt
Seminar presentation on digital signature pptSeminar presentation on digital signature ppt
Seminar presentation on digital signature ppt
Ravi Ranjan
 
Digital signature certificate
Digital signature certificateDigital signature certificate
Digital signature certificate
Ashvini Soni
 
Cryptography
CryptographyCryptography
Cryptography
TanviGogri
 
App Authentication
App AuthenticationApp Authentication
App Authentication
Trevayne Van Niekerk
 
Digital Certificate Email usage
Digital Certificate Email usageDigital Certificate Email usage
Digital Certificate Email usage
BUSINESS SOFTWARES & SOLUTIONS
 
Digital signatures
Digital signaturesDigital signatures
Digital signatures
Ishwar Dayal
 
Digital Signatures
Digital SignaturesDigital Signatures
Digital Signatures
Ehtisham Ali
 
Digital signatures and e-Commerce
Digital signatures and e-CommerceDigital signatures and e-Commerce
Digital signatures and e-Commerce
Naveen Jakhar, I.T.S
 
Kerberos-PKI-Federated identity
Kerberos-PKI-Federated identityKerberos-PKI-Federated identity
Kerberos-PKI-Federated identity
WAFAA AL SALMAN
 
Digital signature
Digital signatureDigital signature
Digital signature
CHESStest{perfect Kadhu}
 
Digital signature and certificate authority
Digital signature and certificate authorityDigital signature and certificate authority
Digital signature and certificate authority
KrutiShah114
 
SSl and certificates
SSl and certificatesSSl and certificates
SSl and certificates
Netri Chowdhary
 

What's hot (20)

Digital signature
Digital signatureDigital signature
Digital signature
 
Digital signature
Digital signatureDigital signature
Digital signature
 
CYBER SECURITY : DIGITAL SIGNATURE,
CYBER SECURITY : DIGITAL SIGNATURE,CYBER SECURITY : DIGITAL SIGNATURE,
CYBER SECURITY : DIGITAL SIGNATURE,
 
Digital Signatures
Digital SignaturesDigital Signatures
Digital Signatures
 
Digital Signature
Digital SignatureDigital Signature
Digital Signature
 
Digital signature
Digital signatureDigital signature
Digital signature
 
Digital signatures
Digital signaturesDigital signatures
Digital signatures
 
PKI by Tim Polk
PKI by Tim PolkPKI by Tim Polk
PKI by Tim Polk
 
Seminar presentation on digital signature ppt
Seminar presentation on digital signature pptSeminar presentation on digital signature ppt
Seminar presentation on digital signature ppt
 
Digital signature certificate
Digital signature certificateDigital signature certificate
Digital signature certificate
 
Cryptography
CryptographyCryptography
Cryptography
 
App Authentication
App AuthenticationApp Authentication
App Authentication
 
Digital Certificate Email usage
Digital Certificate Email usageDigital Certificate Email usage
Digital Certificate Email usage
 
Digital signatures
Digital signaturesDigital signatures
Digital signatures
 
Digital Signatures
Digital SignaturesDigital Signatures
Digital Signatures
 
Digital signatures and e-Commerce
Digital signatures and e-CommerceDigital signatures and e-Commerce
Digital signatures and e-Commerce
 
Kerberos-PKI-Federated identity
Kerberos-PKI-Federated identityKerberos-PKI-Federated identity
Kerberos-PKI-Federated identity
 
Digital signature
Digital signatureDigital signature
Digital signature
 
Digital signature and certificate authority
Digital signature and certificate authorityDigital signature and certificate authority
Digital signature and certificate authority
 
SSl and certificates
SSl and certificatesSSl and certificates
SSl and certificates
 

Similar to Digital certificates

Presentation on digital signatures & digital certificates
Presentation on digital signatures & digital certificatesPresentation on digital signatures & digital certificates
Presentation on digital signatures & digital certificates
Vivaka Nand
 
Digital certificates
Digital certificates Digital certificates
Digital certificates
Sheetal Verma
 
Digital certificates & its importance
Digital certificates & its importanceDigital certificates & its importance
Digital certificates & its importance
svm
 
PKI and Applications
PKI and ApplicationsPKI and Applications
PKI and Applications
Svetlin Nakov
 
Impact of digital certificate in network security
Impact of digital certificate in network securityImpact of digital certificate in network security
Impact of digital certificate in network security
rhassan84
 
Impact of digital certificate in network security
Impact of digital certificate in network securityImpact of digital certificate in network security
Impact of digital certificate in network security
rhassan84
 
Digital certificates in e commerce
Digital certificates in e commerceDigital certificates in e commerce
Digital certificates in e commerce
mahesh tawade
 
Chapter 2 System Security.pptx
Chapter 2 System Security.pptxChapter 2 System Security.pptx
Chapter 2 System Security.pptx
RushikeshChikane2
 
Digital Signature in Indian Evidence act .pptx
Digital Signature in Indian Evidence act .pptxDigital Signature in Indian Evidence act .pptx
Digital Signature in Indian Evidence act .pptx
9jz8vgkshv
 
Digital Signatdsbuisduifhudosffdosfure.pptx
Digital Signatdsbuisduifhudosffdosfure.pptxDigital Signatdsbuisduifhudosffdosfure.pptx
Digital Signatdsbuisduifhudosffdosfure.pptx
MuthuvasanSR
 
Digital signature
Digital signatureDigital signature
Digital signature
gajerachetan
 
Kumkum digital certificate
Kumkum digital certificateKumkum digital certificate
Kumkum digital certificate
Kumkum Sharma
 
E-Business security
E-Business security E-Business security
E-Business security
Surendhranatha Reddy
 
Unit v
Unit vUnit v
The world of encryption
The world of encryptionThe world of encryption
The world of encryption
Mohammad Yousri
 
public key infrastructure
public key infrastructurepublic key infrastructure
public key infrastructure
vimal kumar
 
Understanding Digital Certificates & Secure Sockets Layer
Understanding Digital Certificates & Secure Sockets LayerUnderstanding Digital Certificates & Secure Sockets Layer
Understanding Digital Certificates & Secure Sockets Layer
CheapSSLUSA
 
Digital certificate
Digital certificateDigital certificate
Digital certificate
Komal Agarwal
 
Digital signature
Digital  signatureDigital  signature
Digital signature
AJAL A J
 
Digital signature by mohsin iftikhar
Digital signature by mohsin iftikhar Digital signature by mohsin iftikhar
Digital signature by mohsin iftikhar
Mohsin Ali
 

Similar to Digital certificates (20)

Presentation on digital signatures & digital certificates
Presentation on digital signatures & digital certificatesPresentation on digital signatures & digital certificates
Presentation on digital signatures & digital certificates
 
Digital certificates
Digital certificates Digital certificates
Digital certificates
 
Digital certificates & its importance
Digital certificates & its importanceDigital certificates & its importance
Digital certificates & its importance
 
PKI and Applications
PKI and ApplicationsPKI and Applications
PKI and Applications
 
Impact of digital certificate in network security
Impact of digital certificate in network securityImpact of digital certificate in network security
Impact of digital certificate in network security
 
Impact of digital certificate in network security
Impact of digital certificate in network securityImpact of digital certificate in network security
Impact of digital certificate in network security
 
Digital certificates in e commerce
Digital certificates in e commerceDigital certificates in e commerce
Digital certificates in e commerce
 
Chapter 2 System Security.pptx
Chapter 2 System Security.pptxChapter 2 System Security.pptx
Chapter 2 System Security.pptx
 
Digital Signature in Indian Evidence act .pptx
Digital Signature in Indian Evidence act .pptxDigital Signature in Indian Evidence act .pptx
Digital Signature in Indian Evidence act .pptx
 
Digital Signatdsbuisduifhudosffdosfure.pptx
Digital Signatdsbuisduifhudosffdosfure.pptxDigital Signatdsbuisduifhudosffdosfure.pptx
Digital Signatdsbuisduifhudosffdosfure.pptx
 
Digital signature
Digital signatureDigital signature
Digital signature
 
Kumkum digital certificate
Kumkum digital certificateKumkum digital certificate
Kumkum digital certificate
 
E-Business security
E-Business security E-Business security
E-Business security
 
Unit v
Unit vUnit v
Unit v
 
The world of encryption
The world of encryptionThe world of encryption
The world of encryption
 
public key infrastructure
public key infrastructurepublic key infrastructure
public key infrastructure
 
Understanding Digital Certificates & Secure Sockets Layer
Understanding Digital Certificates & Secure Sockets LayerUnderstanding Digital Certificates & Secure Sockets Layer
Understanding Digital Certificates & Secure Sockets Layer
 
Digital certificate
Digital certificateDigital certificate
Digital certificate
 
Digital signature
Digital  signatureDigital  signature
Digital signature
 
Digital signature by mohsin iftikhar
Digital signature by mohsin iftikhar Digital signature by mohsin iftikhar
Digital signature by mohsin iftikhar
 

More from Deevena Dayaal

Smart note taker
Smart note takerSmart note taker
Smart note taker
Deevena Dayaal
 
Wimax
WimaxWimax
Smart note taker
Smart note takerSmart note taker
Smart note taker
Deevena Dayaal
 
Smart dust
Smart dustSmart dust
Smart dust
Deevena Dayaal
 
Sixth sense
Sixth senseSixth sense
Sixth sense
Deevena Dayaal
 
Satellite phones
Satellite phonesSatellite phones
Satellite phones
Deevena Dayaal
 
Rolltops
RolltopsRolltops
Rolltops
Deevena Dayaal
 
Redtacton
RedtactonRedtacton
Redtacton
Deevena Dayaal
 
Windows8
Windows8Windows8
Windows8
Deevena Dayaal
 
Nokia morph
Nokia morphNokia morph
Nokia morph
Deevena Dayaal
 
Mind reading computer
Mind reading computerMind reading computer
Mind reading computer
Deevena Dayaal
 
Ip telephony
Ip telephonyIp telephony
Ip telephony
Deevena Dayaal
 
Haptics
HapticsHaptics
Dna computing
Dna computingDna computing
Dna computing
Deevena Dayaal
 
Halographic data storage
Halographic data storageHalographic data storage
Halographic data storage
Deevena Dayaal
 
Gsm network
Gsm networkGsm network
Gsm network
Deevena Dayaal
 
Globus toolkit in grid
Globus toolkit in gridGlobus toolkit in grid
Globus toolkit in grid
Deevena Dayaal
 
Gi fi technology
Gi fi technologyGi fi technology
Gi fi technology
Deevena Dayaal
 
Fuel cells
Fuel cellsFuel cells
Fuel cells
Deevena Dayaal
 
Firewalls
FirewallsFirewalls
Firewalls
Deevena Dayaal
 

More from Deevena Dayaal (20)

Smart note taker
Smart note takerSmart note taker
Smart note taker
 
Wimax
WimaxWimax
Wimax
 
Smart note taker
Smart note takerSmart note taker
Smart note taker
 
Smart dust
Smart dustSmart dust
Smart dust
 
Sixth sense
Sixth senseSixth sense
Sixth sense
 
Satellite phones
Satellite phonesSatellite phones
Satellite phones
 
Rolltops
RolltopsRolltops
Rolltops
 
Redtacton
RedtactonRedtacton
Redtacton
 
Windows8
Windows8Windows8
Windows8
 
Nokia morph
Nokia morphNokia morph
Nokia morph
 
Mind reading computer
Mind reading computerMind reading computer
Mind reading computer
 
Ip telephony
Ip telephonyIp telephony
Ip telephony
 
Haptics
HapticsHaptics
Haptics
 
Dna computing
Dna computingDna computing
Dna computing
 
Halographic data storage
Halographic data storageHalographic data storage
Halographic data storage
 
Gsm network
Gsm networkGsm network
Gsm network
 
Globus toolkit in grid
Globus toolkit in gridGlobus toolkit in grid
Globus toolkit in grid
 
Gi fi technology
Gi fi technologyGi fi technology
Gi fi technology
 
Fuel cells
Fuel cellsFuel cells
Fuel cells
 
Firewalls
FirewallsFirewalls
Firewalls
 

Recently uploaded

Wound healing PPT
Wound healing PPTWound healing PPT
Wound healing PPT
Jyoti Chand
 
PIMS Job Advertisement 2024.pdf Islamabad
PIMS Job Advertisement 2024.pdf IslamabadPIMS Job Advertisement 2024.pdf Islamabad
PIMS Job Advertisement 2024.pdf Islamabad
AyyanKhan40
 
Hindi varnamala | hindi alphabet PPT.pdf
Hindi varnamala | hindi alphabet PPT.pdfHindi varnamala | hindi alphabet PPT.pdf
Hindi varnamala | hindi alphabet PPT.pdf
Dr. Mulla Adam Ali
 
BÀI TẬP DẠY THÊM TIẾNG ANH LỚP 7 CẢ NĂM FRIENDS PLUS SÁCH CHÂN TRỜI SÁNG TẠO ...
BÀI TẬP DẠY THÊM TIẾNG ANH LỚP 7 CẢ NĂM FRIENDS PLUS SÁCH CHÂN TRỜI SÁNG TẠO ...BÀI TẬP DẠY THÊM TIẾNG ANH LỚP 7 CẢ NĂM FRIENDS PLUS SÁCH CHÂN TRỜI SÁNG TẠO ...
BÀI TẬP DẠY THÊM TIẾNG ANH LỚP 7 CẢ NĂM FRIENDS PLUS SÁCH CHÂN TRỜI SÁNG TẠO ...
Nguyen Thanh Tu Collection
 
Chapter wise All Notes of First year Basic Civil Engineering.pptx
Chapter wise All Notes of First year Basic Civil Engineering.pptxChapter wise All Notes of First year Basic Civil Engineering.pptx
Chapter wise All Notes of First year Basic Civil Engineering.pptx
Denish Jangid
 
A Independência da América Espanhola LAPBOOK.pdf
A Independência da América Espanhola LAPBOOK.pdfA Independência da América Espanhola LAPBOOK.pdf
A Independência da América Espanhola LAPBOOK.pdf
Jean Carlos Nunes Paixão
 
Liberal Approach to the Study of Indian Politics.pdf
Liberal Approach to the Study of Indian Politics.pdfLiberal Approach to the Study of Indian Politics.pdf
Liberal Approach to the Study of Indian Politics.pdf
WaniBasim
 
What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...
What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...
What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...
GeorgeMilliken2
 
How to deliver Powerpoint Presentations.pptx
How to deliver Powerpoint  Presentations.pptxHow to deliver Powerpoint  Presentations.pptx
How to deliver Powerpoint Presentations.pptx
HajraNaeem15
 
Advanced Java[Extra Concepts, Not Difficult].docx
Advanced Java[Extra Concepts, Not Difficult].docxAdvanced Java[Extra Concepts, Not Difficult].docx
Advanced Java[Extra Concepts, Not Difficult].docx
adhitya5119
 
Main Java[All of the Base Concepts}.docx
Main Java[All of the Base Concepts}.docxMain Java[All of the Base Concepts}.docx
Main Java[All of the Base Concepts}.docx
adhitya5119
 
RHEOLOGY Physical pharmaceutics-II notes for B.pharm 4th sem students
RHEOLOGY Physical pharmaceutics-II notes for B.pharm 4th sem studentsRHEOLOGY Physical pharmaceutics-II notes for B.pharm 4th sem students
RHEOLOGY Physical pharmaceutics-II notes for B.pharm 4th sem students
Himanshu Rai
 
Beyond Degrees - Empowering the Workforce in the Context of Skills-First.pptx
Beyond Degrees - Empowering the Workforce in the Context of Skills-First.pptxBeyond Degrees - Empowering the Workforce in the Context of Skills-First.pptx
Beyond Degrees - Empowering the Workforce in the Context of Skills-First.pptx
EduSkills OECD
 
South African Journal of Science: Writing with integrity workshop (2024)
South African Journal of Science: Writing with integrity workshop (2024)South African Journal of Science: Writing with integrity workshop (2024)
South African Journal of Science: Writing with integrity workshop (2024)
Academy of Science of South Africa
 
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
PECB
 
How to Fix the Import Error in the Odoo 17
How to Fix the Import Error in the Odoo 17How to Fix the Import Error in the Odoo 17
How to Fix the Import Error in the Odoo 17
Celine George
 
UGC NET Exam Paper 1- Unit 1:Teaching Aptitude
UGC NET Exam Paper 1- Unit 1:Teaching AptitudeUGC NET Exam Paper 1- Unit 1:Teaching Aptitude
UGC NET Exam Paper 1- Unit 1:Teaching Aptitude
S. Raj Kumar
 
Leveraging Generative AI to Drive Nonprofit Innovation
Leveraging Generative AI to Drive Nonprofit InnovationLeveraging Generative AI to Drive Nonprofit Innovation
Leveraging Generative AI to Drive Nonprofit Innovation
TechSoup
 
Traditional Musical Instruments of Arunachal Pradesh and Uttar Pradesh - RAYH...
Traditional Musical Instruments of Arunachal Pradesh and Uttar Pradesh - RAYH...Traditional Musical Instruments of Arunachal Pradesh and Uttar Pradesh - RAYH...
Traditional Musical Instruments of Arunachal Pradesh and Uttar Pradesh - RAYH...
imrankhan141184
 
Présentationvvvvvvvvvvvvvvvvvvvvvvvvvvvv2.pptx
Présentationvvvvvvvvvvvvvvvvvvvvvvvvvvvv2.pptxPrésentationvvvvvvvvvvvvvvvvvvvvvvvvvvvv2.pptx
Présentationvvvvvvvvvvvvvvvvvvvvvvvvvvvv2.pptx
siemaillard
 

Recently uploaded (20)

Wound healing PPT
Wound healing PPTWound healing PPT
Wound healing PPT
 
PIMS Job Advertisement 2024.pdf Islamabad
PIMS Job Advertisement 2024.pdf IslamabadPIMS Job Advertisement 2024.pdf Islamabad
PIMS Job Advertisement 2024.pdf Islamabad
 
Hindi varnamala | hindi alphabet PPT.pdf
Hindi varnamala | hindi alphabet PPT.pdfHindi varnamala | hindi alphabet PPT.pdf
Hindi varnamala | hindi alphabet PPT.pdf
 
BÀI TẬP DẠY THÊM TIẾNG ANH LỚP 7 CẢ NĂM FRIENDS PLUS SÁCH CHÂN TRỜI SÁNG TẠO ...
BÀI TẬP DẠY THÊM TIẾNG ANH LỚP 7 CẢ NĂM FRIENDS PLUS SÁCH CHÂN TRỜI SÁNG TẠO ...BÀI TẬP DẠY THÊM TIẾNG ANH LỚP 7 CẢ NĂM FRIENDS PLUS SÁCH CHÂN TRỜI SÁNG TẠO ...
BÀI TẬP DẠY THÊM TIẾNG ANH LỚP 7 CẢ NĂM FRIENDS PLUS SÁCH CHÂN TRỜI SÁNG TẠO ...
 
Chapter wise All Notes of First year Basic Civil Engineering.pptx
Chapter wise All Notes of First year Basic Civil Engineering.pptxChapter wise All Notes of First year Basic Civil Engineering.pptx
Chapter wise All Notes of First year Basic Civil Engineering.pptx
 
A Independência da América Espanhola LAPBOOK.pdf
A Independência da América Espanhola LAPBOOK.pdfA Independência da América Espanhola LAPBOOK.pdf
A Independência da América Espanhola LAPBOOK.pdf
 
Liberal Approach to the Study of Indian Politics.pdf
Liberal Approach to the Study of Indian Politics.pdfLiberal Approach to the Study of Indian Politics.pdf
Liberal Approach to the Study of Indian Politics.pdf
 
What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...
What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...
What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...
 
How to deliver Powerpoint Presentations.pptx
How to deliver Powerpoint  Presentations.pptxHow to deliver Powerpoint  Presentations.pptx
How to deliver Powerpoint Presentations.pptx
 
Advanced Java[Extra Concepts, Not Difficult].docx
Advanced Java[Extra Concepts, Not Difficult].docxAdvanced Java[Extra Concepts, Not Difficult].docx
Advanced Java[Extra Concepts, Not Difficult].docx
 
Main Java[All of the Base Concepts}.docx
Main Java[All of the Base Concepts}.docxMain Java[All of the Base Concepts}.docx
Main Java[All of the Base Concepts}.docx
 
RHEOLOGY Physical pharmaceutics-II notes for B.pharm 4th sem students
RHEOLOGY Physical pharmaceutics-II notes for B.pharm 4th sem studentsRHEOLOGY Physical pharmaceutics-II notes for B.pharm 4th sem students
RHEOLOGY Physical pharmaceutics-II notes for B.pharm 4th sem students
 
Beyond Degrees - Empowering the Workforce in the Context of Skills-First.pptx
Beyond Degrees - Empowering the Workforce in the Context of Skills-First.pptxBeyond Degrees - Empowering the Workforce in the Context of Skills-First.pptx
Beyond Degrees - Empowering the Workforce in the Context of Skills-First.pptx
 
South African Journal of Science: Writing with integrity workshop (2024)
South African Journal of Science: Writing with integrity workshop (2024)South African Journal of Science: Writing with integrity workshop (2024)
South African Journal of Science: Writing with integrity workshop (2024)
 
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
 
How to Fix the Import Error in the Odoo 17
How to Fix the Import Error in the Odoo 17How to Fix the Import Error in the Odoo 17
How to Fix the Import Error in the Odoo 17
 
UGC NET Exam Paper 1- Unit 1:Teaching Aptitude
UGC NET Exam Paper 1- Unit 1:Teaching AptitudeUGC NET Exam Paper 1- Unit 1:Teaching Aptitude
UGC NET Exam Paper 1- Unit 1:Teaching Aptitude
 
Leveraging Generative AI to Drive Nonprofit Innovation
Leveraging Generative AI to Drive Nonprofit InnovationLeveraging Generative AI to Drive Nonprofit Innovation
Leveraging Generative AI to Drive Nonprofit Innovation
 
Traditional Musical Instruments of Arunachal Pradesh and Uttar Pradesh - RAYH...
Traditional Musical Instruments of Arunachal Pradesh and Uttar Pradesh - RAYH...Traditional Musical Instruments of Arunachal Pradesh and Uttar Pradesh - RAYH...
Traditional Musical Instruments of Arunachal Pradesh and Uttar Pradesh - RAYH...
 
Présentationvvvvvvvvvvvvvvvvvvvvvvvvvvvv2.pptx
Présentationvvvvvvvvvvvvvvvvvvvvvvvvvvvv2.pptxPrésentationvvvvvvvvvvvvvvvvvvvvvvvvvvvv2.pptx
Présentationvvvvvvvvvvvvvvvvvvvvvvvvvvvv2.pptx
 

Digital certificates

  • 1.
  • 2.  A digital certificate is equivalent to an electronic id card. It serves two purposes:  To establish the identity of the owner of the certificate.  To distribute the owner's public key
  • 3. Web Server Certificates: These are the electronic equivalent of a business license. It assures potential customers that the site they are visiting is a legitimate business.
  • 4. Developer Certificates: These certificates enable developers to sign software and macros and deliver them safely to customers over the Internet. The customer can be confident that the software or macros are legitimate. Personal Certificates: These certificates secures e-mail conversations and access to corporate web servers.
  • 5. Service Thawte Verisign Server certificates Initial server certificates $125 $349 Server certificate renewal $100 $249 Personal certificates Class1 Free $14.95 Class2 $20 $14.95 Developer certificates Initial certificate $200 $100 Renewal $100 $400
  • 6. How DCs Protect the Data 1. Encryption & Digital Certificates are the solution for Internet Commerce. Used together, they protect your data as it travels over the Internet. 2. Encryption is the process of using a mathematical algorithm to transform information into a format that can't be read (this format is called cipher text). Decryption is the process of using another algorithm to transform encrypted information back into a readable format (this format is called plain text). 3. Digital Certificates are your digital passport, an Internet ID. They are verification of you who you are and the integrity of your data
  • 7. Digital Certificates Protect & Secure:  Authentication: This is digital verification of who you are, much in the same way your driver's license proves your identity. It is very easy to send spoofed email.  Integrity: This is the verification that the data you sent has not been altered. When email or other data travels across the Internet, it routes through various gateways (way stations). It is possible for people to capture, alter, then resend the message.
  • 8.  Encryption: This ensures that your data was unable to be read or utilized by any party while in transit. Your message is encrypted into incomprehensible gibberish before it leaves your computer. It maintains it encrypted (gibberish) state during it's travel through the Internet. It is not de-crypt until the recipient receives it. Because of the public-key cryptography used (discussed later) only the recipient can decipher the received message, no one else can.
  • 9. Token verification: Digital tokens replace your password which can be easily guessed. Tokens offer a more secure way of access to sensitive data. The most common way to secure data or a web site is with passwords. Before anyone access the data, they are prompted with their user login id and password. However, this is easily cracked using various security software (such as Crack 5.0, etc.). Also, passwords can be found with other means, such as social engineering. Passwords are not secure. Token verification is more secure.
  • 10. Requesting certificates Certificate Request  To get a certificate, you must send a certificate request to the CA.  It includes the following: 1. The distinguished name of the owner (the user for whom the certificate is being requested). 2. The public key of the owner. 3. The digital signature of the owner.
  • 11. Contents of a digital certificate : A certificate contains several pieces of information, including information about the owner of the certificate and the issuing CA. Specifically, a certificate includes: 1. The distinguished name (DN) of the owner. A DN is a unique identifier, a fully qualified name including not only the common name (CN) of the owner, but the owner's organization and other distinguishing information. 2. The public key of the owner.
  • 12. 3. The date on which the certificate was issued. 4. The date on which the certificate expires. 5. The distinguished name of the issuing CA. 6. The digital signature of the issuing CA. (The message-digest function is run over all the preceding fields.)
  • 13. Digital Certificates provide a way to authenticate communication on the Internet. They come in three flavors: personal, web server, and developer certificates. Personal certificates are primarily used for e-mail. Universal acceptance and widespread use will depend on the industry’s ability to communicate in understandable terms and the development of a true standard Four factors 1. Cost 2. Compatibility 3. Perceived need 4. Familiarity