SlideShare una empresa de Scribd logo
1 de 38
Impact of Digital Certificate in
Network Security
Fahad Ibne Rahman
Rakibul Hassan
Mohammad Islam
MBA 513 OL2 15/SP MGMT INFORMATION SYSTEMS
Outline
 Overview of Digital Certificate
 Current Status of Digital Certificate
 Impacts/Potential Benefits of Digital Certificate
 Barriers to Implementing Digital Certificate
 Future Trends for Digital Certificate
Overview of Digital Certificate
 A digital certificate is an electronic permit that allows a person,
organization or a computer to exchange the information securely over the
Internet by using the public key infrastructure (PKI).
 Digital certificates help establish the identity of people or electronic assets.
 They protect online transactions by providing secure, encrypted, online
communication.
Types of Digital Certificates
There are four main types of digital certificates :-
Server Certificates
Personal Certificates
Organization Certificates
Developer Certificates
What Digital Certificate Contain
A digital certificate (DC) is a digital file that certifies the identity of an
individual or an institution.
 The certificate contains the name of the certificate holder
 A serial number
 Expiration dates
 A copy of the certificate holder's public key
 Digital signature of the certificate-issuing authority
Certificate Authorities (CA)
Certificate Authority or certification authority (CA) is an entity that
issues digital certificate. A digital certificate certifies the ownership of
a public key by the named subject of the certificate.
Process of obtaining a certificate
 Step 1. Purchase the digital certificate
 Step 2. Generate and submit a Certificate Signing Request (CSR)
 Step 3. Validate the request
 Step 4. Install the Certificate
SSL Certificates
 SSL (Secure Sockets Layer) is a standard security technology for
establishing an encrypted link between a server and a client
 SSL allows sensitive information such as credit card numbers, social
security numbers, and login credentials to be transmitted securely.
 More specifically, SSL is a security protocol.
SSL Certificate Create a Secure Connection
SSL Certificate Create Secure Connection
 Step1. Browser connects to a web server (website) secured with SSL (https). Browser requests
that the server identify itself.
 Step2. Server sends a copy of its SSL Certificate, including the server’s public key.
 Step3. Browser checks the certificate root against a list of trusted CAs and that the certificate is
unexpired, unrevoked, and that its common name is valid for the website that it is connecting to.
If the browser trusts the certificate, it creates, encrypts, and sends back a symmetric session key
using the server’s public key.
 Step4. Server decrypts the symmetric session key using its private key and sends back an
acknowledgement encrypted with the session key to start the encrypted session.
 Step5. Server and Browser now encrypt all transmitted data with the session key.
SSL Certificate Create Secure Connection
Example of Secure Connection
Example of Secure Connection
Why security needed on the Internet
The Internet is an open communications network that was not
originally designed with security in mind. Criminals have found they
can abuse its weaknesses for untruthful gain. If the Internet is to
succeed as a business and communications tool users must be able to
communicate securely.
Security provide
The number of people and businesses online is continuing to increase. As access
becomes faster and cheaper such people will spend even more time connected to the
Internet for personal communication and business transactions. Digital certificate
gives the following security:
 Identification / Authentication
 Confidentiality
 Integrity
 Non-Repudiation
 Access Control
Current Status of Digital Certificate
A Digital Certificate is an electronic card, or the digital equivalent of an
identification card, that certifies online transactions, e-commerce and other
authentications on the Internet. Mostly use of Digital Certificate on:
 Communication Security
 Online Banking
 Facilitating E-commerce
 Prevent Online Threats
Impacts/Potential Benefits of Digital Certificate
Digital Certificates are one of the many solutions available for authentication.
Major benefits of Digital Certificates are as follows:
Minimal involvement needed from end users
No additional hardware needed
Easy to manage
Certificates are natively supported by many enterprise applications and
networks
Minimal involvement needed from end users
 Minimal onboarding/training process
 Decreased support calls
No additional hardware needed
 No tokens to distribute and manage
 No need for a back-up plan in the case of forgotten/lost tokens
 Users can work across multiple devices without interruption
Easy to manage
 Minimal internal resources needed to support the solution
 Easy to issue and revoke credentials with employee turnover
 Easily scaled to accommodate business growth
Certificates are natively supported
 Minimal configuration needed to implement
 Easily enable two-factor authentication across multiple applications
and networks
 Support mobile/remote workforce
Some other advantages
 Speed
 Costs
 Security
 Authenticity
 Tracking
 Imposter prevention
 Time-Stamp
Barriers to Implementing Digital Certificate
Just like all other electronic products, digital signatures have some
disadvantages that go with them
Financial Disadvantages
Technological Disadvantages
Financial Disadvantages
 Financial Businesses must purchase digital certificates from
certification authorities.
 Certification authorities typically require a subscription to their service,
which requires monthly payments to continue the relationship.
 Multiple certificates for different sites or purposes can become a costly
endeavor.
Technological Barriers/ Disadvantages
 Creating a platform that accepts all digital certificates is a difficult
undertaking.
 Human carelessness may compromise the safety of login
identifications.
Others Disadvantages
 Expiry
 Certificates
 Software
 Law
 Compatibility
Future Trends for Digital Certificate
 Digital certificate will overcome it’s current barrier.
 In case of server crash new request need to sent every time for the
reissue of digital certificate, discontinue of secure service.
 Will be more flexible to use for server.
Internet User
The use of legally obtained certificates
A few years ago, digital certificates were actively used by large
software manufacturers that were legally registered companies. Today,
certificates are used increasingly often by individual software
developers and small companies. As can be seen, the number of
certificates is steadily growing year on year.
The use of legally obtained certificates
The number of certificates verified by CAs and known to Kaspersky Lab
Summary
 Protect main website/domains.
 Use SSL certificate to add security/value to company’s online
presence.
 Standardize domain WHOIS.
 Consolidate and reduce costs.
 Ensure company's certificates are up to date.
Summary
The most widely used standard for
digital certificate is
X.509
Questions and Answers
Thank you
Bibliography
 Laudon, K. C., & Laudon, J. P. (2012). Management Information Systems,
Managing the Digital Firm. Upper Saddle River: Pearson Education, Inc.
 Ciampa, M. (2012). Security+ Guide to Network Security Fundamentals.
From
https://books.google.com/books?id=CIHYWBrg9JQC&pg=PA468&dq=di
gital+certificate&hl=en&sa=X&ei=NwDeVP6EGcyayATlmYL4Ag&ved
=0CFQQ6AEwBg#v=onepage&q&f=false
 Kahate, A. (2013), Cryptography and Network Security, third edition.
From
https://books.google.com/books?id=xCDZAgAAQBAJ&pg=PA206&dq=
digital+certificate&hl=en&sa=X&ei=Vy_hVIDzGOeIsQS5tILQBQ&ved=
0CGcQ6AEwCQ#v=onepage&q=digital%20certificate&f=false
Bibliography
 Retrieved April 1, 2015, from
http://searchsecurity.techtarget.com/definition/digital-certificate
 Retrieved April 10, 2015, from http://scurit.com/why-you-shouldnt-completely-
trust-files-signed-with-digital-certificates/
 Retrieved April 7, 2015, from http://dictionary.reference.com/browse/digital
certificate/
 Retrieved April 11, 2015, from https://www.globalsign.com/en/ssl-information-
center/what-is-an-ssl-certificate/
Bibliography
 Retrieved April 8, 2015, from https://www.globalsign.com/en/blog/4-benefits-of-
certificate-based-authentication/
 Retrieved April 12, 2015, from http://www.ehow.com/facts_4862018_advantages-
digital-certificate.html
 Retrieved April 8, 2015, from https://www.digicert.com/ssl.htm
 Retrieved April 2, 2015, from
https://sites.google.com/site/thedigitallibrarian/barriers-to-integrating-technology/
Bibliography
 Retrieved April 3, 2015, from http://securelist.com/blog/68593/why-
you-shouldnt-completely-trust-files-signed-with-digital-certificates/
 Retrieved April 6, 2015, from https://www.digicert.com/ppc/ssl-
explained.htm?cid=70160000000OIpaAAG&gclid=CO-
j0L_688QCFdgGgQodXl0Abw/

Más contenido relacionado

La actualidad más candente

Strong Customer Authentication & Biometrics
Strong Customer Authentication & BiometricsStrong Customer Authentication & Biometrics
Strong Customer Authentication & BiometricsFIDO Alliance
 
How to Build Interoperable Decentralized Identity Systems with OpenID for Ver...
How to Build Interoperable Decentralized Identity Systems with OpenID for Ver...How to Build Interoperable Decentralized Identity Systems with OpenID for Ver...
How to Build Interoperable Decentralized Identity Systems with OpenID for Ver...Torsten Lodderstedt
 
Password Policy and Account Lockout Policies
Password Policy and Account Lockout PoliciesPassword Policy and Account Lockout Policies
Password Policy and Account Lockout Policiesanilinvns
 
public key infrastructure
public key infrastructurepublic key infrastructure
public key infrastructurevimal kumar
 
FIDO Alliance: Welcome and FIDO Update.pptx
FIDO Alliance: Welcome and FIDO Update.pptxFIDO Alliance: Welcome and FIDO Update.pptx
FIDO Alliance: Welcome and FIDO Update.pptxFIDO Alliance
 
Single sign on (SSO) How does your company apply?
Single sign on (SSO) How does your company apply?Single sign on (SSO) How does your company apply?
Single sign on (SSO) How does your company apply?Đỗ Duy Trung
 
FIDO Specifications Overview: UAF & U2F
FIDO Specifications Overview: UAF & U2FFIDO Specifications Overview: UAF & U2F
FIDO Specifications Overview: UAF & U2FFIDO Alliance
 
Digital signature
Digital  signatureDigital  signature
Digital signatureAJAL A J
 
Digital Signature
Digital SignatureDigital Signature
Digital Signaturesaurav5884
 
Difference Between Digital Signature vs Digital Certificate
Difference Between Digital Signature vs Digital CertificateDifference Between Digital Signature vs Digital Certificate
Difference Between Digital Signature vs Digital CertificateAboutSSL
 
Authentication Application in Network Security NS4
Authentication Application in Network Security NS4Authentication Application in Network Security NS4
Authentication Application in Network Security NS4koolkampus
 
Security Policies and Standards
Security Policies and StandardsSecurity Policies and Standards
Security Policies and Standardsprimeteacher32
 
User Identity and Authentication
User Identity and AuthenticationUser Identity and Authentication
User Identity and AuthenticationAmazon Web Services
 

La actualidad más candente (20)

Strong Customer Authentication & Biometrics
Strong Customer Authentication & BiometricsStrong Customer Authentication & Biometrics
Strong Customer Authentication & Biometrics
 
How to Build Interoperable Decentralized Identity Systems with OpenID for Ver...
How to Build Interoperable Decentralized Identity Systems with OpenID for Ver...How to Build Interoperable Decentralized Identity Systems with OpenID for Ver...
How to Build Interoperable Decentralized Identity Systems with OpenID for Ver...
 
SSL/TLS Handshake
SSL/TLS HandshakeSSL/TLS Handshake
SSL/TLS Handshake
 
Password Policy and Account Lockout Policies
Password Policy and Account Lockout PoliciesPassword Policy and Account Lockout Policies
Password Policy and Account Lockout Policies
 
public key infrastructure
public key infrastructurepublic key infrastructure
public key infrastructure
 
Digital certificates
Digital certificatesDigital certificates
Digital certificates
 
FIDO Alliance: Welcome and FIDO Update.pptx
FIDO Alliance: Welcome and FIDO Update.pptxFIDO Alliance: Welcome and FIDO Update.pptx
FIDO Alliance: Welcome and FIDO Update.pptx
 
Single sign on (SSO) How does your company apply?
Single sign on (SSO) How does your company apply?Single sign on (SSO) How does your company apply?
Single sign on (SSO) How does your company apply?
 
FIDO Specifications Overview: UAF & U2F
FIDO Specifications Overview: UAF & U2FFIDO Specifications Overview: UAF & U2F
FIDO Specifications Overview: UAF & U2F
 
Public key Infrastructure (PKI)
Public key Infrastructure (PKI)Public key Infrastructure (PKI)
Public key Infrastructure (PKI)
 
Digital Signature ppt
Digital Signature pptDigital Signature ppt
Digital Signature ppt
 
Digital signature
Digital signatureDigital signature
Digital signature
 
Digital signature
Digital  signatureDigital  signature
Digital signature
 
Digital Signature
Digital SignatureDigital Signature
Digital Signature
 
Difference Between Digital Signature vs Digital Certificate
Difference Between Digital Signature vs Digital CertificateDifference Between Digital Signature vs Digital Certificate
Difference Between Digital Signature vs Digital Certificate
 
Digital signatures
Digital signaturesDigital signatures
Digital signatures
 
FAPI 最新情報 - OpenID BizDay #15
FAPI 最新情報 - OpenID BizDay #15FAPI 最新情報 - OpenID BizDay #15
FAPI 最新情報 - OpenID BizDay #15
 
Authentication Application in Network Security NS4
Authentication Application in Network Security NS4Authentication Application in Network Security NS4
Authentication Application in Network Security NS4
 
Security Policies and Standards
Security Policies and StandardsSecurity Policies and Standards
Security Policies and Standards
 
User Identity and Authentication
User Identity and AuthenticationUser Identity and Authentication
User Identity and Authentication
 

Similar a Impact of digital certificate in network security

Digital certificates in e commerce
Digital certificates in e commerceDigital certificates in e commerce
Digital certificates in e commercemahesh tawade
 
Understanding Digital Certificates & Secure Sockets Layer
Understanding Digital Certificates & Secure Sockets LayerUnderstanding Digital Certificates & Secure Sockets Layer
Understanding Digital Certificates & Secure Sockets LayerCheapSSLUSA
 
Chapter 2 System Security.pptx
Chapter 2 System Security.pptxChapter 2 System Security.pptx
Chapter 2 System Security.pptxRushikeshChikane2
 
PKI and Applications
PKI and ApplicationsPKI and Applications
PKI and ApplicationsSvetlin Nakov
 
Digital certificate management v1 (Draft)
Digital certificate management v1 (Draft)Digital certificate management v1 (Draft)
Digital certificate management v1 (Draft)Avirot Mitamura
 
Digital Certificates and Secure Web Access
Digital Certificates and Secure Web AccessDigital Certificates and Secure Web Access
Digital Certificates and Secure Web Accessbluntm64
 
Offer a trustworthy environment on your web site
Offer a trustworthy environment on your web siteOffer a trustworthy environment on your web site
Offer a trustworthy environment on your web siteKeynectis
 
How to offer a trustworhty environment on the web?
How to offer a trustworhty environment on the web?How to offer a trustworhty environment on the web?
How to offer a trustworhty environment on the web?Keynectis
 
CCM_WP-9-8-16-v10__MT_GP_Final
CCM_WP-9-8-16-v10__MT_GP_FinalCCM_WP-9-8-16-v10__MT_GP_Final
CCM_WP-9-8-16-v10__MT_GP_FinalGreg Posten
 
Kerberos-PKI-Federated identity
Kerberos-PKI-Federated identityKerberos-PKI-Federated identity
Kerberos-PKI-Federated identityWAFAA AL SALMAN
 
Ch12 Cryptographic Protocols and Public Key Infrastructure
Ch12 Cryptographic Protocols and Public Key InfrastructureCh12 Cryptographic Protocols and Public Key Infrastructure
Ch12 Cryptographic Protocols and Public Key InfrastructureInformation Technology
 
I would appreciate help with these 4 questions. Thank You.1) Expla.pdf
I would appreciate help with these 4 questions. Thank You.1) Expla.pdfI would appreciate help with these 4 questions. Thank You.1) Expla.pdf
I would appreciate help with these 4 questions. Thank You.1) Expla.pdfJUSTSTYLISH3B2MOHALI
 

Similar a Impact of digital certificate in network security (20)

Digital certificates in e commerce
Digital certificates in e commerceDigital certificates in e commerce
Digital certificates in e commerce
 
Understanding Digital Certificates & Secure Sockets Layer
Understanding Digital Certificates & Secure Sockets LayerUnderstanding Digital Certificates & Secure Sockets Layer
Understanding Digital Certificates & Secure Sockets Layer
 
The world of encryption
The world of encryptionThe world of encryption
The world of encryption
 
Chapter 2 System Security.pptx
Chapter 2 System Security.pptxChapter 2 System Security.pptx
Chapter 2 System Security.pptx
 
All About SSL/TLS
All About SSL/TLSAll About SSL/TLS
All About SSL/TLS
 
PKI and Applications
PKI and ApplicationsPKI and Applications
PKI and Applications
 
Digital certificate management v1 (Draft)
Digital certificate management v1 (Draft)Digital certificate management v1 (Draft)
Digital certificate management v1 (Draft)
 
Digital certificates
Digital certificatesDigital certificates
Digital certificates
 
Digital Certificates and Secure Web Access
Digital Certificates and Secure Web AccessDigital Certificates and Secure Web Access
Digital Certificates and Secure Web Access
 
IS-Crypttools.pptx
IS-Crypttools.pptxIS-Crypttools.pptx
IS-Crypttools.pptx
 
Offer a trustworthy environment on your web site
Offer a trustworthy environment on your web siteOffer a trustworthy environment on your web site
Offer a trustworthy environment on your web site
 
How to offer a trustworhty environment on the web?
How to offer a trustworhty environment on the web?How to offer a trustworhty environment on the web?
How to offer a trustworhty environment on the web?
 
CCM_WP-9-8-16-v10__MT_GP_Final
CCM_WP-9-8-16-v10__MT_GP_FinalCCM_WP-9-8-16-v10__MT_GP_Final
CCM_WP-9-8-16-v10__MT_GP_Final
 
Kerberos-PKI-Federated identity
Kerberos-PKI-Federated identityKerberos-PKI-Federated identity
Kerberos-PKI-Federated identity
 
E-Business security
E-Business security E-Business security
E-Business security
 
Ch12 Cryptographic Protocols and Public Key Infrastructure
Ch12 Cryptographic Protocols and Public Key InfrastructureCh12 Cryptographic Protocols and Public Key Infrastructure
Ch12 Cryptographic Protocols and Public Key Infrastructure
 
Ssl Https Server
Ssl Https ServerSsl Https Server
Ssl Https Server
 
Understanding The World Of SSL Certificates.pdf
Understanding The World Of SSL Certificates.pdfUnderstanding The World Of SSL Certificates.pdf
Understanding The World Of SSL Certificates.pdf
 
Digital certificate
Digital certificateDigital certificate
Digital certificate
 
I would appreciate help with these 4 questions. Thank You.1) Expla.pdf
I would appreciate help with these 4 questions. Thank You.1) Expla.pdfI would appreciate help with these 4 questions. Thank You.1) Expla.pdf
I would appreciate help with these 4 questions. Thank You.1) Expla.pdf
 

Último

办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书
办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书
办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书zdzoqco
 
办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一
办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一
办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一z xss
 
Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作
Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作
Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作ys8omjxb
 
SCM Symposium PPT Format Customer loyalty is predi
SCM Symposium PPT Format Customer loyalty is prediSCM Symposium PPT Format Customer loyalty is predi
SCM Symposium PPT Format Customer loyalty is predieusebiomeyer
 
Internet of Things Presentation (IoT).pptx
Internet of Things Presentation (IoT).pptxInternet of Things Presentation (IoT).pptx
Internet of Things Presentation (IoT).pptxErYashwantJagtap
 
Font Performance - NYC WebPerf Meetup April '24
Font Performance - NYC WebPerf Meetup April '24Font Performance - NYC WebPerf Meetup April '24
Font Performance - NYC WebPerf Meetup April '24Paul Calvano
 
『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书
『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书
『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书rnrncn29
 
NSX-T and Service Interfaces presentation
NSX-T and Service Interfaces presentationNSX-T and Service Interfaces presentation
NSX-T and Service Interfaces presentationMarko4394
 
『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书
『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书
『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书rnrncn29
 
PHP-based rendering of TYPO3 Documentation
PHP-based rendering of TYPO3 DocumentationPHP-based rendering of TYPO3 Documentation
PHP-based rendering of TYPO3 DocumentationLinaWolf1
 
Top 10 Interactive Website Design Trends in 2024.pptx
Top 10 Interactive Website Design Trends in 2024.pptxTop 10 Interactive Website Design Trends in 2024.pptx
Top 10 Interactive Website Design Trends in 2024.pptxDyna Gilbert
 
Call Girls In The Ocean Pearl Retreat Hotel New Delhi 9873777170
Call Girls In The Ocean Pearl Retreat Hotel New Delhi 9873777170Call Girls In The Ocean Pearl Retreat Hotel New Delhi 9873777170
Call Girls In The Ocean Pearl Retreat Hotel New Delhi 9873777170Sonam Pathan
 
Unidad 4 – Redes de ordenadores (en inglés).pptx
Unidad 4 – Redes de ordenadores (en inglés).pptxUnidad 4 – Redes de ordenadores (en inglés).pptx
Unidad 4 – Redes de ordenadores (en inglés).pptxmibuzondetrabajo
 
Contact Rya Baby for Call Girls New Delhi
Contact Rya Baby for Call Girls New DelhiContact Rya Baby for Call Girls New Delhi
Contact Rya Baby for Call Girls New Delhimiss dipika
 
Film cover research (1).pptxsdasdasdasdasdasa
Film cover research (1).pptxsdasdasdasdasdasaFilm cover research (1).pptxsdasdasdasdasdasa
Film cover research (1).pptxsdasdasdasdasdasa494f574xmv
 
Q4-1-Illustrating-Hypothesis-Testing.pptx
Q4-1-Illustrating-Hypothesis-Testing.pptxQ4-1-Illustrating-Hypothesis-Testing.pptx
Q4-1-Illustrating-Hypothesis-Testing.pptxeditsforyah
 

Último (17)

办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书
办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书
办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书
 
办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一
办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一
办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一
 
Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作
Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作
Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作
 
SCM Symposium PPT Format Customer loyalty is predi
SCM Symposium PPT Format Customer loyalty is prediSCM Symposium PPT Format Customer loyalty is predi
SCM Symposium PPT Format Customer loyalty is predi
 
Internet of Things Presentation (IoT).pptx
Internet of Things Presentation (IoT).pptxInternet of Things Presentation (IoT).pptx
Internet of Things Presentation (IoT).pptx
 
Font Performance - NYC WebPerf Meetup April '24
Font Performance - NYC WebPerf Meetup April '24Font Performance - NYC WebPerf Meetup April '24
Font Performance - NYC WebPerf Meetup April '24
 
Hot Sexy call girls in Rk Puram 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in  Rk Puram 🔝 9953056974 🔝 Delhi escort ServiceHot Sexy call girls in  Rk Puram 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Rk Puram 🔝 9953056974 🔝 Delhi escort Service
 
『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书
『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书
『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书
 
NSX-T and Service Interfaces presentation
NSX-T and Service Interfaces presentationNSX-T and Service Interfaces presentation
NSX-T and Service Interfaces presentation
 
『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书
『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书
『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书
 
PHP-based rendering of TYPO3 Documentation
PHP-based rendering of TYPO3 DocumentationPHP-based rendering of TYPO3 Documentation
PHP-based rendering of TYPO3 Documentation
 
Top 10 Interactive Website Design Trends in 2024.pptx
Top 10 Interactive Website Design Trends in 2024.pptxTop 10 Interactive Website Design Trends in 2024.pptx
Top 10 Interactive Website Design Trends in 2024.pptx
 
Call Girls In The Ocean Pearl Retreat Hotel New Delhi 9873777170
Call Girls In The Ocean Pearl Retreat Hotel New Delhi 9873777170Call Girls In The Ocean Pearl Retreat Hotel New Delhi 9873777170
Call Girls In The Ocean Pearl Retreat Hotel New Delhi 9873777170
 
Unidad 4 – Redes de ordenadores (en inglés).pptx
Unidad 4 – Redes de ordenadores (en inglés).pptxUnidad 4 – Redes de ordenadores (en inglés).pptx
Unidad 4 – Redes de ordenadores (en inglés).pptx
 
Contact Rya Baby for Call Girls New Delhi
Contact Rya Baby for Call Girls New DelhiContact Rya Baby for Call Girls New Delhi
Contact Rya Baby for Call Girls New Delhi
 
Film cover research (1).pptxsdasdasdasdasdasa
Film cover research (1).pptxsdasdasdasdasdasaFilm cover research (1).pptxsdasdasdasdasdasa
Film cover research (1).pptxsdasdasdasdasdasa
 
Q4-1-Illustrating-Hypothesis-Testing.pptx
Q4-1-Illustrating-Hypothesis-Testing.pptxQ4-1-Illustrating-Hypothesis-Testing.pptx
Q4-1-Illustrating-Hypothesis-Testing.pptx
 

Impact of digital certificate in network security

  • 1. Impact of Digital Certificate in Network Security Fahad Ibne Rahman Rakibul Hassan Mohammad Islam MBA 513 OL2 15/SP MGMT INFORMATION SYSTEMS
  • 2. Outline  Overview of Digital Certificate  Current Status of Digital Certificate  Impacts/Potential Benefits of Digital Certificate  Barriers to Implementing Digital Certificate  Future Trends for Digital Certificate
  • 3. Overview of Digital Certificate  A digital certificate is an electronic permit that allows a person, organization or a computer to exchange the information securely over the Internet by using the public key infrastructure (PKI).  Digital certificates help establish the identity of people or electronic assets.  They protect online transactions by providing secure, encrypted, online communication.
  • 4. Types of Digital Certificates There are four main types of digital certificates :- Server Certificates Personal Certificates Organization Certificates Developer Certificates
  • 5. What Digital Certificate Contain A digital certificate (DC) is a digital file that certifies the identity of an individual or an institution.  The certificate contains the name of the certificate holder  A serial number  Expiration dates  A copy of the certificate holder's public key  Digital signature of the certificate-issuing authority
  • 6. Certificate Authorities (CA) Certificate Authority or certification authority (CA) is an entity that issues digital certificate. A digital certificate certifies the ownership of a public key by the named subject of the certificate.
  • 7. Process of obtaining a certificate  Step 1. Purchase the digital certificate  Step 2. Generate and submit a Certificate Signing Request (CSR)  Step 3. Validate the request  Step 4. Install the Certificate
  • 8. SSL Certificates  SSL (Secure Sockets Layer) is a standard security technology for establishing an encrypted link between a server and a client  SSL allows sensitive information such as credit card numbers, social security numbers, and login credentials to be transmitted securely.  More specifically, SSL is a security protocol.
  • 9. SSL Certificate Create a Secure Connection
  • 10. SSL Certificate Create Secure Connection  Step1. Browser connects to a web server (website) secured with SSL (https). Browser requests that the server identify itself.  Step2. Server sends a copy of its SSL Certificate, including the server’s public key.  Step3. Browser checks the certificate root against a list of trusted CAs and that the certificate is unexpired, unrevoked, and that its common name is valid for the website that it is connecting to. If the browser trusts the certificate, it creates, encrypts, and sends back a symmetric session key using the server’s public key.  Step4. Server decrypts the symmetric session key using its private key and sends back an acknowledgement encrypted with the session key to start the encrypted session.  Step5. Server and Browser now encrypt all transmitted data with the session key.
  • 11. SSL Certificate Create Secure Connection
  • 12. Example of Secure Connection
  • 13. Example of Secure Connection
  • 14. Why security needed on the Internet The Internet is an open communications network that was not originally designed with security in mind. Criminals have found they can abuse its weaknesses for untruthful gain. If the Internet is to succeed as a business and communications tool users must be able to communicate securely.
  • 15. Security provide The number of people and businesses online is continuing to increase. As access becomes faster and cheaper such people will spend even more time connected to the Internet for personal communication and business transactions. Digital certificate gives the following security:  Identification / Authentication  Confidentiality  Integrity  Non-Repudiation  Access Control
  • 16. Current Status of Digital Certificate A Digital Certificate is an electronic card, or the digital equivalent of an identification card, that certifies online transactions, e-commerce and other authentications on the Internet. Mostly use of Digital Certificate on:  Communication Security  Online Banking  Facilitating E-commerce  Prevent Online Threats
  • 17. Impacts/Potential Benefits of Digital Certificate Digital Certificates are one of the many solutions available for authentication. Major benefits of Digital Certificates are as follows: Minimal involvement needed from end users No additional hardware needed Easy to manage Certificates are natively supported by many enterprise applications and networks
  • 18. Minimal involvement needed from end users  Minimal onboarding/training process  Decreased support calls
  • 19. No additional hardware needed  No tokens to distribute and manage  No need for a back-up plan in the case of forgotten/lost tokens  Users can work across multiple devices without interruption
  • 20. Easy to manage  Minimal internal resources needed to support the solution  Easy to issue and revoke credentials with employee turnover  Easily scaled to accommodate business growth
  • 21. Certificates are natively supported  Minimal configuration needed to implement  Easily enable two-factor authentication across multiple applications and networks  Support mobile/remote workforce
  • 22. Some other advantages  Speed  Costs  Security  Authenticity  Tracking  Imposter prevention  Time-Stamp
  • 23. Barriers to Implementing Digital Certificate Just like all other electronic products, digital signatures have some disadvantages that go with them Financial Disadvantages Technological Disadvantages
  • 24. Financial Disadvantages  Financial Businesses must purchase digital certificates from certification authorities.  Certification authorities typically require a subscription to their service, which requires monthly payments to continue the relationship.  Multiple certificates for different sites or purposes can become a costly endeavor.
  • 25. Technological Barriers/ Disadvantages  Creating a platform that accepts all digital certificates is a difficult undertaking.  Human carelessness may compromise the safety of login identifications.
  • 26. Others Disadvantages  Expiry  Certificates  Software  Law  Compatibility
  • 27. Future Trends for Digital Certificate  Digital certificate will overcome it’s current barrier.  In case of server crash new request need to sent every time for the reissue of digital certificate, discontinue of secure service.  Will be more flexible to use for server.
  • 29. The use of legally obtained certificates A few years ago, digital certificates were actively used by large software manufacturers that were legally registered companies. Today, certificates are used increasingly often by individual software developers and small companies. As can be seen, the number of certificates is steadily growing year on year.
  • 30. The use of legally obtained certificates The number of certificates verified by CAs and known to Kaspersky Lab
  • 31. Summary  Protect main website/domains.  Use SSL certificate to add security/value to company’s online presence.  Standardize domain WHOIS.  Consolidate and reduce costs.  Ensure company's certificates are up to date.
  • 32. Summary The most widely used standard for digital certificate is X.509
  • 35. Bibliography  Laudon, K. C., & Laudon, J. P. (2012). Management Information Systems, Managing the Digital Firm. Upper Saddle River: Pearson Education, Inc.  Ciampa, M. (2012). Security+ Guide to Network Security Fundamentals. From https://books.google.com/books?id=CIHYWBrg9JQC&pg=PA468&dq=di gital+certificate&hl=en&sa=X&ei=NwDeVP6EGcyayATlmYL4Ag&ved =0CFQQ6AEwBg#v=onepage&q&f=false  Kahate, A. (2013), Cryptography and Network Security, third edition. From https://books.google.com/books?id=xCDZAgAAQBAJ&pg=PA206&dq= digital+certificate&hl=en&sa=X&ei=Vy_hVIDzGOeIsQS5tILQBQ&ved= 0CGcQ6AEwCQ#v=onepage&q=digital%20certificate&f=false
  • 36. Bibliography  Retrieved April 1, 2015, from http://searchsecurity.techtarget.com/definition/digital-certificate  Retrieved April 10, 2015, from http://scurit.com/why-you-shouldnt-completely- trust-files-signed-with-digital-certificates/  Retrieved April 7, 2015, from http://dictionary.reference.com/browse/digital certificate/  Retrieved April 11, 2015, from https://www.globalsign.com/en/ssl-information- center/what-is-an-ssl-certificate/
  • 37. Bibliography  Retrieved April 8, 2015, from https://www.globalsign.com/en/blog/4-benefits-of- certificate-based-authentication/  Retrieved April 12, 2015, from http://www.ehow.com/facts_4862018_advantages- digital-certificate.html  Retrieved April 8, 2015, from https://www.digicert.com/ssl.htm  Retrieved April 2, 2015, from https://sites.google.com/site/thedigitallibrarian/barriers-to-integrating-technology/
  • 38. Bibliography  Retrieved April 3, 2015, from http://securelist.com/blog/68593/why- you-shouldnt-completely-trust-files-signed-with-digital-certificates/  Retrieved April 6, 2015, from https://www.digicert.com/ppc/ssl- explained.htm?cid=70160000000OIpaAAG&gclid=CO- j0L_688QCFdgGgQodXl0Abw/