Are there any calculators to help estimate log generation based on number of devices and best practices?
Extended Validation (EV) SSL certificates provide users with a high degree of assurance that they are indeed dealing with the business they think is on the other end of the transaction. The most misunderstood fact about this technology is that it does not add more security to a transaction than a standard certificate. EV SSL uses the same cryptographic technology as standard SSL certificates and does not add any confidentiality controls to the communication between a user and a website.
In order to obtain an EV SSL certificate, an organization must provide its certificate authority (CA) with much more proof than that required for a standard certificate (which is usually as simple as verifying your WHOIS registration and doing a simple check that you have some piece of paper from the government with your business name on it). The CA/Browser Forum's EV Guidelines (pdf) specify that the CA must verify:
- The physical existence of the organization
- The legal existence of the organization
- The operational existence of the organization
- That the identity of the organization matches legal records
- That the organization has exclusive use of the domain name in the certificate subject
- That the organization authorized the issuance of the EV certificate
The bottom line is that consumers can place a higher degree of trust in EV SSL certificates, confident that the organization receiving the certificate underwent a rigorous background investigation.
- Some researchers say EV SSL certificates won't stop phishers.
- Read a chapter from The Shortcut Guide to Extended Validation SSL Certificates.
Dig Deeper on PKI and digital certificates
Related Q&A from Mike Chapple
Explore the differences between wired and wireless network security, and read up on best practices to ensure security with or without wires. Continue Reading
Choosing to encrypt confidential data with AES or DES encryption is an important cybersecurity matter. Learn about the important differences between ... Continue Reading
It's not possible to eradicate the risk of DoS attacks, but there are steps infosec pros can take to reduce their impact. Mike Chapple shares ... Continue Reading