The words Security Certificate directly relate to an encryption technology that can authenticate participants in an electronic transaction or exchange. One of the technologies is known as Public Key Infrastructure. The technology is based upon encryption and authentication mechanisms. A protected connection is first established and safe communications can be provided from end-to-end. On occasion the infrastructure owner provides the service. Under different circumstances, a third party (such as VeriSign) provides assurance.
Its Relevance: An organization’s information infrastructure must function in an asymmetric threat environment. The capacity of most businesses to assure the security of all components of an online transaction is limited. Typically, third-party products provide for more robust encryption. The manner in which e-commerce functions and the methods to be followed must be included in an organization’s information security policies.
Return from "Security Certificate" to Words [S - U]