You are a business analyst working for an online retailing business “Travel Shoppers”. Your manager needs you to explain to him how your business web server – using TLS – provides strong security for customers completing online purchasing with Travel Shoppers. Specifically your manager is concerned about ‘hacking’ attacks in which a ‘rogue’ server will take a copy of the Travel Shoppers digital certificate, and then fraudulently use this copy to complete transactions with unsuspecting Travel Shoppers customers. He wants to know if this can happen – in part or completely, what are the controls inbuilt into TLS and certificates to combat this, and what is the central strategy that Travel Shoppers needs to focus upon to support TLS in this specific area.
You are a business analyst working for an online retailing business “Travel Shoppers”. Your manager needs you to explain to him how your business web server – using TLS – provides strong security for customers completing online purchasing with Travel Shoppers. Specifically your manager is concerned about ‘hacking’ attacks in which a ‘rogue’ server will take a copy of the Travel Shoppers digital certificate, and then fraudulently use this copy to complete transactions with unsuspecting Travel Shoppers customers.
He wants to know if this can happen – in part or completely, what are the controls inbuilt into TLS and certificates to combat this, and what is the central strategy that Travel Shoppers needs to focus upon to support TLS in this specific area.
Step by step
Solved in 2 steps with 2 images