Vulnerabilities and exploitation of digital certificates

 

 

 

 

Description

 

 

 

 

Provide an outline of the technological infrastructure of the digital certificates, overview the most important business cases of their usages, investigate the various vulnerabilities, analyse the
exploitation techniques that are known and, finally, provide a framework of mitigation and prevention methods. The study is based on the reports of the software industry analysts and the
requirements of modem distributed information systems. Deliverables of good practices and up-to-date technical approaches will be given.