REVISION: CONTINUATION Vulnerabilities and exploitation of digital certificates
Revision comments
10/20/2017 12:33PM:
DRAFT FEEDBACK:
– The literature is rather old for an Msc project in computer science. The most references should be within the last 3 years (2015-16-17).
– As you mention a framework will be given for the safe usage of digital certificates. As there is a danger that the project will be just a review, we need to formulate the architecture of an application that will provide this guarantee to the user. The analysis, design and mockups of this application must be included. Of course real implementation is not needed.
CHECK THESE COMMENTS
12/20
please continue working with file "Order__164740.docx", delete plagiarism and address the latest revision comments (mentioned above) because they were not still addressed
Description
In this work, we intend to give an outline of the technological infrastructure of the digital certificates, overview the most important business cases of their usages, investigate the various vulnerabilities, analyse the exploitation techniques that are known and, finally, provide a framework of mitigation and prevention methods.
The study is based on the reports of the software industry analysts and the requirements of modern distributed information systems. Deliverables of good practices and up-to-date technical approaches will be given. The project will be evaluated to the technical and analytic approach and the effectiveness of the proposed methodology.