Simple Questions About Online Security

Consider the following questions carefully:

Q1. When you visit a web site, like your Bank’s for example, how do you know that it really is their web site?
Q2. When you download software from the Internet, how can you be sure that it really is from the original Publisher?
Q3. If you are sending a confidential email to someone, how can you be sure that they are the only person that can open it?
Q4. Your company has a Virtual Private Network [VPN], how can you replace password security with a stronger alternative?
Q5. When you make a payment over the Internet using your credit card, how can you be assured a hacker won’t steal it during transmission?
Q6. If your organisation wishes to use the internet to have business forms / documents (legally binding) signed on line, how can you do this?
Q7. Your organisation wishes to put some or all of its systems on line for suppliers, customers, etc. How can you securely control access to them?

Digital certificates can be used in a variety of different security situations; however the most common uses are for proving identity, digitally signing/sealing files and encrypting data or two factor authentications.

This is how digital certificates answer the above questions:

A1. If the Bank is serious about security, they will use a Digi-SSL™ Secure Web Server certificate to prove its online web site identity.
A2. Using a Digi-Code™ Software/Code Signing certificate, a pop up dialog box assures the user of the Publisher’s identity prior to download.
A3. If the email is first encrypted using an email certificates [Digi-Mail™], and then only the intended recipient can decrypt the email.
A4. Passwords can be copied and misused, however, if each user has a Digi-Access™ certificate, security and identification is assured because this is strong two factor authentication.
A5. The same Digi-SSL™ that confirms the identity of the website automatically encrypts any data that is submitted through it.
A6. Again using the Digi-ID™, because the identity of the owner has been verified, they can use it to sign any digital file.
A7. Using a Digi-CA™ combined with Digi-Access™, the systems can be secured and all users can be verified before offering them the correct access level.