首页> 外文学位 >An examination of the growing enterprise threat associated with compromised keys and certificates with recommendations for changes to control objectives for information and related technology standards.
【24h】

An examination of the growing enterprise threat associated with compromised keys and certificates with recommendations for changes to control objectives for information and related technology standards.

机译:研究与密钥和证书泄露有关的企业威胁的增长,并提出更改信息和相关技术标准控制目标的建议。

获取原文
获取原文并翻译 | 示例

摘要

The purpose of this capstone project is to address the increase in worldwide cyber-threat when using keys and certificates as a form of encryption. The discussion focuses on published analysis and reviews of documented compromises of keys and certificates by users and issuing Certificate Authorities (CA). The specific questions this study addresses include: How significant are the attacks associated with a compromised key and certificate? What are the different type of attacks that can take place with a breach of an organization's keys and certificates? What risk mitigation is in place by the CA's to prevent a breach of key and certificate trust? Has action been taken from lessons learned of documented compromises of keys and certificates? There should be an understanding of the amount of keys and certificates that exist in an organizations environment. An enterprise should use best practices for certificate processes and procedures to maintain encryption trust. The spread of advanced malware is a result of key and certificate compromises. This study focuses on the role keys and certificates play in modern world encryption and the challenges of the issuing CA. The study concludes that further progress needs to take place within the user community and the CA industry in the areas of risk mitigation. The current trust environment is under cyber-threat and needs to shift from acting out of reaction to taking steps for prevention. Keywords: cybersecurity, Daniel Draz, Stuxnet, DigiNotar, Comodo, TURKTRUST, Flame, malware.
机译:此项目的目的是解决使用密钥和证书作为加密形式时全球网络威胁的增加。讨论的重点是用户对已发布的密钥和证书的折衷进行分析和审查,并颁发证书颁发机构(CA)。这项研究解决的特定问题包括:与泄露的密钥和证书相关的攻击有多重要?违反组织的密钥和证书会发生什么不同类型的攻击? CA采取了哪些缓解风险的措施来防止破坏密钥和证书信任?是否从已记录的密钥和证书泄露的教训中采取了行动?应该了解组织环境中存在的密钥和证书的数量。企业应该对证书流程和过程使用最佳实践来维护加密信任。高级恶意软件的传播是密钥和证书泄露的结果。这项研究的重点是密钥和证书在现代世界加密中的作用以及颁发CA的挑战。该研究得出的结论是,在减轻风险的领域中,用户社区和CA行业需要进一步发展。当前的信任环境正处于网络威胁之下,需要从不采取行动转变为采取预防措施。关键字:网络安全,Daniel Draz,Stuxnet,DigiNotar,Comodo,TURKTRUST,Flame,恶意软件。

著录项

  • 作者

    Carter, Candice M.;

  • 作者单位

    Utica College.;

  • 授予单位 Utica College.;
  • 学科 Information Technology.;Sociology Criminology and Penology.;Computer Science.
  • 学位 M.S.
  • 年度 2013
  • 页码 65 p.
  • 总页数 65
  • 原文格式 PDF
  • 正文语种 eng
  • 中图分类
  • 关键词

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号