-
Digital certificates validation methods: a comparison
Read moreDigital Certificates validation is an important topic in keeping information secure. In this article, I’ll show you a comparison of these methods. Using public-key cryptography solves the key exchange problem that exists in symmetric cryptography. However, another problem shows up: trust. Does the public key that comes from the other end of the connection belong […]
-
Information security system: a resemblance with other security systems
Read moreAn Information Security System is usually described using a technical vocabulary. It is worth noting that any error in the system can imply a significant loss of resources. Sometimes is not clear where to start studying this type of system. Although in most cases it is better to hire a specialist, there are principles that […]