Building an Enterprise Root Certification Authority in Small and Medium Businesses
Table of Contents | ||
---|---|---|
|
Introduction
Unprotected information exchange across the Internet, extranets, intranets, and between applications presents potential security risks to any organization today. The challenges include preventing an unauthorized third party from eavesdropping on information traveling over the Internet, masquerading as an authorized person, or disrupting the ability of an organization to conduct business.
...