ASKER
ASKER
ASKER
ASKER
Security is the protection of information systems from theft or damage to the hardware, the software, and the information on them, as well as from disruption or misdirection of the services they provide. The main goal of security is protecting assets, and an asset is anything of value and worthy of protection. Information Security is a discipline of protecting information assets from threats through safeguards to achieve the objectives of confidentiality, integrity, and availability or CIA for short. On the other hand, disclosure, alteration, and disruption (DAD) compromise the security objectives.
TRUSTED BY
intermediate Root Signed and is there by trusted
end user "refelcts" the user/service. But the authenticity is based on the process the signing entity goes through to verify that the person applying for the certificate is who they say they are and represent what they say they represent.
I.e a person presenting a State issued document is presumed to be who they say they are given it is a State issued document. If a person presents a school ID, the school is somewhat similar to an intermediate i.e. recognized by the State and thereby derives its credibility from the state. If someone presents a school ID from a school you've never heard of, you will likely be more suspicious of whether the person is who they say they are.
As far as types, there are too many to enumerate, but can easily be found when searched.
Trusted, intermediate, subordinated.
Code, user, Web sites, etc.
The end result is the same to convey that who ever presents is who/what/and come from an entity represented in the certificate.