Page 118 - DCAP309_INFORMATION_SECURITY_AND_PRIVACY
P. 118

Information  Security and Privacy




                    Notes          A digital certificate contains an entity’s name, address, serial number, public key, expiration
                                   date and digital signature, among other information. When a Web browser like Firefox, Netscape
                                   or Internet Explorer makes a secure connection, the digital certificate is automatically turned
                                   over for review. The browser checks it for anomalies or problems, and pops up an alert if any are
                                   found. When digital certificates are in order, the browser completes secure connections without
                                   interruption.
                                   The problem, however, is that anyone can create a website  and key  pair using a name that
                                   doesn’t belong to them. This is where digital certificates come in. Digital certificates are trusted
                                   ID cards in electronic form that bind a website’s public encryption key to their identity  for
                                   purposes of public trust.
                                   Though rare, there have been cases of phishing scams duplicating a website and ‘hijacking’ the
                                   site’s digital certificate to  fool customers  into giving up personal  information. These scams
                                   involved redirecting the customer to the real site for authentication, then bringing them back to
                                   the duped website.
                                   Other phishing scams use self-signed digital certificates to dispose of the trusted third party or
                                   Certificate Authority altogether. The issuer of the digital certificate and the signer are one in the
                                   same. A browser will alert in this case, but most users click through anyway, not understanding
                                   the difference.





                                     Notes  Not all Certificate Authorities are equal. Some CAs are newer and less well known.
                                     Two examples of highly trusted CAs are VeriSign and Thawte. If your browser does not
                                     recognize a Certificate Authority, it will alert you.

                                   8.3.1 Verifying the  Certificate

                                   Digital certificates play an integral role in keeping online commerce safe. If your browser alerts
                                   you to a problem with a digital certificate, you are well-advised not to click through. Instead,
                                   call the business using a telephone number from your statements or phone book, and inquire as
                                   to the problem.
                                   Public key encryption uses SSL (Secure Sockets Layer) to encrypt all data between the customer’s
                                   computer and the e-commerce website. Information is sent in encrypted form to the site using
                                   the site’s public key. Upon receiving the information, the site uses its private key to decrypt the
                                   information. This is called a key pair. Interlopers that might capture data en route will find it
                                   unreadable.
                                   The CA verifies that a public key belongs to a specific company or individual (the “subject”), and
                                   the validation process it goes through to determine if the subject is who it claims to be depends
                                   on the level of certification and the CA itself.

                                   After the validation process is completed, the CA creates an X.509 certificate that contains CA
                                   and subject information, including the subject’s public key (details below). The CA signs the
                                   certificate by creating a digest (a hash) of all the fields in the certificate and encrypting the hash
                                   value with its private key. The encrypted digest is called a “digital signature,” and when placed
                                   into the X.509 certificate, the certificate is said to be “signed.”
                                   The CA keeps its private key very secure, because if ever discovered, false certificates could be
                                   created.

                                   The process of verifying the “signed certificate” is done by the recipient’s software, which is
                                   typically the Web browser. The browser maintains an  internal list  of popular CAs and their



          112                               LOVELY PROFESSIONAL UNIVERSITY
   113   114   115   116   117   118   119   120   121   122   123