Consider the following questions carefully:
Q1. | When you visit a web site, like your Bank’s for example, how do you know that it really is their web site? |
Q2. | When you download software from the Internet, how can you be sure that it really is from the original Publisher? |
Q3. | If you are sending a confidential email to someone, how can you be sure that they are the only person that can open it? |
Q4. | Your company has a Virtual Private Network [VPN], how can you replace password security with a stronger alternative? |
Q5. | When you make a payment over the Internet using your credit card, how can you be assured a hacker won’t steal it during transmission? |
Q6. | If your organisation wishes to use the internet to have business forms / documents (legally binding) signed on line, how can you do this? |
Q7. | Your organisation wishes to put some or all of its systems on line for suppliers, customers, etc. How can you securely control access to them? |
Digital certificates can be used in a variety of different security situations; however the most common uses are for proving identity, digitally signing/sealing files and encrypting data or two factor authentications.
This is how digital certificates answer the above questions:
A1. | If the Bank is serious about security, they will use a Digi-SSL™ Secure Web Server certificate to prove its online web site identity. |
A2. | Using a Digi-Code™ Software/Code Signing certificate, a pop up dialog box assures the user of the Publisher’s identity prior to download. |
A3. | If the email is first encrypted using an email certificates [Digi-Mail™], and then only the intended recipient can decrypt the email. |
A4. | Passwords can be copied and misused, however, if each user has a Digi-Access™ certificate, security and identification is assured because this is strong two factor authentication. |
A5. | The same Digi-SSL™ that confirms the identity of the website automatically encrypts any data that is submitted through it. |
A6. | Again using the Digi-ID™, because the identity of the owner has been verified, they can use it to sign any digital file. |
A7. | Using a Digi-CA™ combined with Digi-Access™, the systems can be secured and all users can be verified before offering them the correct access level. |