In: Computer Science
Suppose a system uses a Public-Key Infrastructure with a Certificate Revocation List. A device in that system is asked to verify a certificate but cannot access the Certificate Revocation List database because of a denial of service attack What are the possible courses of action for the device, and what are the advantages and disadvantages of each course of action?
A public key infrastructure consists of set of roles, policies or procedures that are needed to create, manage, distribute, use, store, and revoke digital certificates. It can also manage public-key encryption. It helps in the facilitation of the secure electronic transfer of information that is transmited over a range of network activities such as e-commerce, internet banking and confidential email.PKI provides a chain of trust, so that identities on a network can be verified.CRLs are a type of blacklist and are used by various endpoints, including Web browsers, to verify whether a certificate is valid and trustworthy. Digital certificates are used in the encryption process to secure communications, most often by using the TLS/SSL protocol.any type of attack where the attackers (hackers) attempt to prevent legitimate users from accessing the service. In a DoS attack, the attacker usually sends excessive messages asking the network or server to authenticate requests that have invalid return addresses.