Business Case Considerations
As discussed in Chapter 3, "The Concept of an Infrastructure," a PKI is a comprehensive security infrastructure, not myriad point solutions. A PKI offers a single security infrastructure that can be used across multiple applications in the most heterogeneous of environments. Specifically, a PKI can be used to enable confidentiality, integrity, authentication, and non-repudiation services in numerous contexts, including one or more of the following:
Secure e-mail
Secure Electronic Data Interchange (EDI)
Secure electronic forms
Secure desktop (for example, encryption of sensitive information on a laptop or PC)
Secure intranets
Secure extranets
End-entity access control
Secure remote access (for example, in support of mobile ...
Get Understanding Public-Key Infrastructure: Concepts, Standards, and Deployment Considerations now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.