The internet security has always been a big issue ever since it was created. As a matter of fact the internet has become a very important part in people’s daily life.
With the advancement of technology nowadays, customers can now even buy almost everything they want to buy online. Of course when buy from companies which provide websites we need to pay, but an issue is actually raised: how secured is it when a customer decides to pay online?
What my topic concerns this time is the usefulness of third party certification in tackling the problem of customers browsing to a fake website, or so-called phising. A third party verification is extremely important to ensure customers are dealing with the genuine website.
There are two licensed company in Malaysia which are eligible of issuing digital certificates, they are:
With the advancement of technology nowadays, customers can now even buy almost everything they want to buy online. Of course when buy from companies which provide websites we need to pay, but an issue is actually raised: how secured is it when a customer decides to pay online?
What my topic concerns this time is the usefulness of third party certification in tackling the problem of customers browsing to a fake website, or so-called phising. A third party verification is extremely important to ensure customers are dealing with the genuine website.
There are two licensed company in Malaysia which are eligible of issuing digital certificates, they are:
~MSC Trustgate.com Sdn Bhd
~Digicert Sdn Bhd.
Well then, what are the applications of third party verification program, or digital certificate? The program may satisfy the requirements of the following applications.
Firstly, third party verification programs are needed in browsers or smart cards to grant access control to facilities, intranet and extranet.
Secondly, they are used to validate incoming messages which have not been modified yet. In other words, it is very useful in operating document archive and retrieval.
Thirdly, digital certificates are required to create the organization’s rights and privileges, in particular, for the purpose of licensing.
Fourthly, companies will need them for integrity and authentication purposes. They are usually used for digital signing of messages to verify the status and identity of the particular sender.
Fifthly, this verification program is used as a proof for document sending or time-stamping. It is crucial for time and date verification for important messages, in this case, the payment systems as it involves legal and commercial activities.
Last but not least, and the most important one, is that the verification program ensures high level security, the private and confidentiality of the organizations. The company will need the program to encrypt and decrypt a code or message, which is the process of converting a message into password by sender and translate it back to readable form by receiver.
In short, third party verification program has been very useful in securing customers and the company data and important information.
Firstly, third party verification programs are needed in browsers or smart cards to grant access control to facilities, intranet and extranet.
Secondly, they are used to validate incoming messages which have not been modified yet. In other words, it is very useful in operating document archive and retrieval.
Thirdly, digital certificates are required to create the organization’s rights and privileges, in particular, for the purpose of licensing.
Fourthly, companies will need them for integrity and authentication purposes. They are usually used for digital signing of messages to verify the status and identity of the particular sender.
Fifthly, this verification program is used as a proof for document sending or time-stamping. It is crucial for time and date verification for important messages, in this case, the payment systems as it involves legal and commercial activities.
Last but not least, and the most important one, is that the verification program ensures high level security, the private and confidentiality of the organizations. The company will need the program to encrypt and decrypt a code or message, which is the process of converting a message into password by sender and translate it back to readable form by receiver.
In short, third party verification program has been very useful in securing customers and the company data and important information.
References:
Prepared by: WONG CHEE WAI