
Internet Security Issues
768
Red Hat Certificate System Administrator’s Guide • September 2005
•
Tampering.
Information in transit is changed or replaced and then sent on to the
recipient. For example, someone could alter an order for goods or change a person's
resume.
•
Impersonation.
Information passes to a person who poses as the intended recipient.
Impersonation can take two forms:
•
Spoofing.
A person can pretend to be someone else. For example, a person can pretend
to have the email address
, or a computer can identify itself as a
site called
www.example.net
when it is not. This type of impersonation is known as
spoofing.
•
Misrepresentation.
A person or organization can misrepresent itself. For example,
suppose the site
www.example.net
pretends to be a furniture store when it is really
just a site that takes credit-card payments but never sends any goods.
Normally, users of the many cooperating computers that make up the Internet or other
networks don’t monitor or interfere with the network traffic that continuously passes
through their machines. However, many sensitive personal and business communications
over the Internet require precautions that address the threats listed above. Fortunately, a set
of well-established techniques and standards known as public-key cryptography make it
relatively easy to take such precautions.
Public-key cryptography facilitates the following tasks:
•
Encryption and decryption allow two communicating parties to disguise information
they send to each other. The sender encrypts, or scrambles, information before sending
it. The receiver decrypts, or unscrambles, the information after receiving it. While in
transit, the encrypted information is unintelligible to an intruder.
•
Tamper detection allows the recipient of information to verify that it has not been
modified in transit. Any attempt to modify data or substitute a false message for a
legitimate one will be detected.
•
Authentication allows the recipient of information to determine its origin—that is, to
confirm the sender’s identity.
•
Nonrepudiation prevents the sender of information from claiming at a later date that the
information was never sent.
The sections that follow introduce the concepts of public-key cryptography that underlie
these capabilities.
Содержание CERTIFICATE 7.1 ADMINISTRATOR
Страница 1: ...Administrator s Guide Red Hat Certificate System Version7 1 September 2005 ...
Страница 22: ...22 Red Hat Certificate System Administrator s Guide September 2005 ...
Страница 128: ...Cloning a CA 128 Red Hat Certificate System Administrator s Guide September 2005 ...
Страница 230: ...Configuring Key Archival and Recovery Process 230 Red Hat Certificate System Administrator s Guide September 2005 ...
Страница 234: ...Enterprise Security Client 234 Red Hat Certificate System Administrator s Guide September 2005 ...
Страница 368: ...ACL Reference 368 Red Hat Certificate System Administrator s Guide September 2005 ...
Страница 460: ...Constraints Reference 460 Red Hat Certificate System Administrator s Guide September 2005 ...
Страница 592: ...CRL Extension Reference 592 Red Hat Certificate System Administrator s Guide September 2005 ...
Страница 676: ...Cloning the Data Recovery Manager 676 Red Hat Certificate System Administrator s Guide September 2005 ...
Страница 688: ...Security Requirements for the IT Environment 688 Red Hat Certificate System Administrator s Guide September 2005 ...
Страница 720: ...1 3 Organization Security Policies 720 Red Hat Certificate System Administrator s Guide September 2005 ...