PKI... Why Go Through the Hassle?
by Guy Vancollie - Chief Marketing Officer of Ubizen - Tuesday, 15 April 2003.
As e-mail increasingly substitutes the use of letters and faxes (also to governmental bodies) and as commercial transactions on the web get more and more important to organisations, the need for secure communications equally grows, especially with spoof attacks, interception of transmissions and other hacking methods becoming more widespread and getting more “intelligent” every day. So, if the web is to achieve its true (commercial) potential, it is important that the right technological infrastructure is in place. Public Key Infrastructure (PKI) enabled by cryptography provides a secure basis. Digital signatures use public key infrastructure.

The European Commission has welcomed the adoption of a new legal framework guaranteeing EU-wide recognition of electronic signatures (European Directive 99/93/EC). The Electronic Signature Directive is a first example of the Commission's flexible and integrated approach towards developing a European framework for the development of electronic commerce. In the past only hand-written signatures have been legally valid but this legislation extends that recognition to electronic signatures and applies the Internal Market principles of free movement of services and home country control to e-commerce. It constitutes an important element in the Commission's on-going efforts to drive forward the rapid development of electronic commerce so as to capitalise on its potential to generate business and create jobs. This framework provides the security that the market for online transactions demands and strengthens the EU's position in the face of international competition in this new global market.

Electronic signatures allow someone receiving data over electronic networks, via the Internet for example, to determine the origin of the data and to check that that data has not been altered. The Directive is not designed to regulate everything in detail but defines the requirements for electronic signature certificates and certification services so as to ensure minimum levels of security.

Spotlight

Windows 0-day exploited in ongoing attacks, temporary workarounds offered

Posted on 22 October 2014.  |  A new Windows zero-day vulnerability is being actively exploited in the wild and is primarily a risk to users on servers and workstations that open documents with embedded OLE objects.


Weekly newsletter

Reading our newsletter every Monday will keep you up-to-date with security news.
  



Daily digest

Receive a daily digest of the latest security news.
  

DON'T
MISS

Thu, Oct 23rd
    COPYRIGHT 1998-2014 BY HELP NET SECURITY.   // READ OUR PRIVACY POLICY // ABOUT US // ADVERTISE //