Explain the risks involved with using SSL where the server’s public key is signed and where the server’s public key is not signed. Include examples where risk is too high and where the risk is probably not too high. In your description, be sure to include the following Describe the vulnerability involved in accessing a web site with an unsigned public key. Describe the vulnerability involved in accessing a web site with a signed public key. Describe a scenario where the risk of having an unsigned public key is acceptable Describe a scenario where the risk of having an unsigned public key is not acceptable but the risk of having a signed public key is acceptable Describe a scenario where risk of using a signed public key is not acceptable
Get Free Quote!
320 Experts Online