-
Digital certificates validation methods: a comparison
Read more: Digital certificates validation methods: a comparisonDigital Certificates validation is an important topic in keeping information secure. In this article, I’ll show you a comparison of these methods. Using public-key cryptography solves the key exchange problem that exists in symmetric cryptography. However, another problem shows up: trust. Does the public key that comes from the other end of the connection belong…
-
Information security system: a resemblance with other security systems
Read more: Information security system: a resemblance with other security systemsAn Information Security System is usually described using a technical vocabulary. It is worth noting that any error in the system can imply a significant loss of resources. Sometimes is not clear where to start studying this type of system. Although in most cases it is better to hire a specialist, there are principles that…