COMPUTER THREATS SECURITY
WHAT IS INTERNET SECURITY
Question
[CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
|
|
The user
|
|
The Browser
|
|
The server
|
|
The web application
|
Detailed explanation-1: -A certificate’s validity period is the time interval during which the signing CA warrants that it will maintain information about its status. Browsers reject any certificates with a validity period ending before or starting after the date and time of the validation check.
Detailed explanation-2: -Digital certificates are often managed by individual website owners or IT employees for an organization that have received permission and authorization to issue them.
Detailed explanation-3: -To validate the digital signature person authenticating the certificate will take the message of the certificate and then uses the same hash algorithm. If the two hashes match then the digital signature is valid and the certificate is authenticated.
Detailed explanation-4: -Your Internet browser compares the issuer with a list of trusted Certificate Authorities (Root CA). If a match can’t be found, the client browser checks to see whether a trusted Root CA signs the issuing CA certificate.
Detailed explanation-5: -A secure URL should begin with “https” rather than “http.” The “s” in “https” stands for secure, which indicates that the site is using a Secure Sockets Layer (SSL) Certificate. This lets you know that all your communication and data is encrypted as it passes from your browser to the website’s server.