Chapter 8

Risk Management in Public Key Certificate Applications

Alex Golod

Introduction

As public key certificates technology became an enabler for many security controls, it became more important to understand all types of risk associated with the use of this technology and its processes and components. This understanding is necessary to address and mitigate the risk and also to make intelligent design decisions that would afford a desirable performance and availability without jeopardizing confidentiality, integrity, and other security requirements. ...

Get Information Security Management Handbook, Volume 6, 6th Edition now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.