COMPUTER THREATS SECURITY
TYPES OF NETWORK SECURITY
Question
[CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
|
|
Registration Authority
|
|
Certificate Authority
|
|
Repudiation Authority
|
|
Intermediate Authority
|
Detailed explanation-1: -In a PKI, a user applies for a digital certificate by first 1) sending a request CSR (Certificate Signing Request). The request is 2) sent to a CA (Certificate Authority) Server. The CA verifies the authenticity of the applicant, and if it is verified, the 3) CA issues a digital certificate.
Detailed explanation-2: -1. Certification authorities (CAs) that issue and revoke certificates. 2. Organizational registration authorities (ORAs) that vouch for the binding between public keys and certificate holder identities and other attributes.
Detailed explanation-3: -The purpose of a PKI is to securely associate a key with an entity. The trusted party signing the document associating the key with the device is called a certificate authority (CA). The certificate authority also has a cryptographic key that it uses for signing these documents. These documents are called certificates.
Detailed explanation-4: -It is a primary tool to ensure e-commerce security as it definitively ties up the name of a participant (such as an e-mail address) in a secured transaction with the public key that is used to sign communication with that entity in a cryptographic system.