COMPUTER THREATS SECURITY
TYPES OF NETWORK SECURITY
Question
[CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
|
|
Certificate practice statement (CPS)
|
|
Certificate policy (CP)
|
|
Lifecycle policy (LP)
|
|
Access policy (AP)
|
Detailed explanation-1: -A CA acts as a trusted third party-trusted both by the subject (owner) of the certificate and by the party relying upon the certificate. The format of these certificates is specified by the X.509 or EMV standard.
Detailed explanation-2: -The Issuer field provides the name of the CA, expressed as a Distinguished Name (DN). The Subject field gives the name of the certificate holder, expressed as a distinguished name (DN).
Detailed explanation-3: -In cryptography, a public key certificate, also known as a digital certificate or identity certificate, is an electronic document used to prove the validity of a public key.
Detailed explanation-4: -An SSL certificate acts like a passport to verify the identity of the website owner, and like a key to keep user data secure via strong encryption.