O'Reilly logo

TICSA TruSecure™ ICSA Certified Security Associate Exam TU0-001 by Shawn Porter, Debra Littlejohn Shinder, Mike Chapple

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Digital Certificates

Public key encryption is more secure than secret key encryption, but implementing it on a large scale is more difficult to manage. If public keys are posted to the Internet without any oversight, someone could provide a public key that purports to be that of another user. Then, data encrypted with that key and intended for the user whose name was associated with it could be intercepted and accessed by the unauthorized user who posted the key with the fraudulent information.

To verify a user's or computer's identity, we need a mechanism for a trusted third party to confirm that the user or computer advertising the public key is in fact who he, she, or it claims to be.

This is the function of a digital certificate. The way ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required