Skip to main content

Some methods of the analysis and risk assessment in the PKI system services providers

  • Conference paper
Enhanced Methods in Computer Security, Biometric and Artificial Intelligence Systems
  • 688 Accesses

Abstract

The PKI systems are one of the main components in the information exchange between employees and customers of the enterprise, and firms as well. Depending on current routing boards, the information which needs to be send can be transferred using many different telecommunication systems. To ensure the confidentiality of the information, the uniform safety policy for the whole enterprise should be defined. Correctly prepared and implemented security policy comprises the rules of authorization for physical access to rooms and objects, and the rules of authorization for access to the network resources as well. As the technical infrastructure introduces the uniform policy, the cryptographical systems can be used, with PKI systems in particular. The PKI system requires the creation of a suitable infrastructure for generation, storage and distribution of keys and certificates. In this article, authors will try to analyze vulnerabilities and threats for the individual components of the PKI infrastructure based on MEHARI method of the risk analysis, which are estimated on a real example. Since even the best system will not guarantee the confidence of users’ keys issued by the Certification Authority, the analysis and assessment is not restricted only to PKI components, but also to the working environment. When subsidiaries of this infrastructure are able to compromise the keys, the whole infrastructure becomes a useless equipment and software storage

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Similar content being viewed by others

References

  1. Carlisle Adams, Steve Lloyd: “Podpis elektroniczny. Klucz publiczny” Biblioteka problemów, Wyd. Robomatic 2001

    Google Scholar 

  2. PresentationMehari_11-2003, www.clusif.asso.fr

    Google Scholar 

  3. www.signet.pl

    Google Scholar 

  4. Peter Herrmann: “How to Integrate Trust Management into a risk Analysis Process” 2nd Internal iTrust Workshop on Trust Management in Dynamic Open Systems, London, September 2003

    Google Scholar 

  5. Carl Ellison, Bruce Schneier: “Ten Risks of PKI: What You’re not Being Told about Public Key Infrastructure”; Computer Security Journal Volume XVL Number 1,2000

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2005 Springer Science+Business Media, Inc.

About this paper

Cite this paper

Pejaś, J., El Fray, I. (2005). Some methods of the analysis and risk assessment in the PKI system services providers. In: Pejaś, J., Piegat, A. (eds) Enhanced Methods in Computer Security, Biometric and Artificial Intelligence Systems. Springer, Boston, MA. https://doi.org/10.1007/0-387-23484-5_6

Download citation

  • DOI: https://doi.org/10.1007/0-387-23484-5_6

  • Publisher Name: Springer, Boston, MA

  • Print ISBN: 978-1-4020-7776-0

  • Online ISBN: 978-0-387-23484-7

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics