Saturday, 19 Apr. 2025
Home
About Us
Our Services
Our Customers
Join Us
Contact Us
Site Map

In the 1990s, as organizations began to leverage the power of the Internet to conduct business, they were faced with the challenge of protecting their vital resources from unauthorized individuals. As sensitive information flowed through the Internet's vast network of cables and routers, it was easily intercepted and monitored by hackers and corporate spies. Simple authentication procedures such as password protection did not go far enough to resolve the problem, as information was still being sent across the network in cleartext (unencrypted), and passwords could be very easily intercepted or guessed and exposed to the world in a matter of milliseconds.

Clearly, organizations needed a way to encrypt information to prevent monitoring, and a stronger method of authenticating individuals to websites and other online resources. Enter Public Key Infrastructure (PKI) technology.

With a PKI, authorized individuals are issued digital certificates which they use to gain access to private network resources. A digital certificate allows its user to sign information with a digital signature which is nearly impossible to fake and provides a high degree of assurance that the person using it is who they say they are. This is precisely why PKI is so critical to the goals of the Homeland Security Presidential Directive #12 (HSPD-12) program (read more about that here). In addition, digitally signed activities are hard to refute. PKI systems also allow the organization to encrypt data where needed, such as data found on private web servers and databases. With encryption enabled, unauthorized attempts to monitor sensitive network information can prove to be exceedingly difficult.

In other words, PKI provides the following services:

  • Confidentiality: Ensuring that electronic information is only viewed by the appropriate individuals. Enforced through encryption.
  • Authentication: Controlling access to electronic resources in a strong manner. Enforced through digital signatures and encryption.
  • Integrity: Ensuring that electronic information has not been unintentionally modified. Enforced through digital signatures.
  • Non-Repudiation: Ensuring that an individual cannot deny having been party to a transaction. Enforced through digital signatures.

Next

 

Home | About Us | Our Services | Our Customers
Join Us | Contact Us | Site Map

This website and its contents Copyright (C) 2017 Solarcore, Inc. All Rights Reserved.