If you require your customers or clients to digitally sign their messages, they cannot claim that someone sent an unauthorized order if they later change their mind. For example, let's say you're a wholesaler and want to accept orders from your retail business customers via e-mail for convenience, or you're a financial services provider and your clients e-mail their transaction requests to you. But, some organizations have their mail servers programmed to strip certain types of attachments or web links from e-mails that are not digitally signed, as an anti-malware measure.Īnother potentially valuable use of digital signatures involves requiring your business partners to sign messages they send to you. Such attacks on e-mail integrity sound outlandish, and they are, in fact, difficult to carry out and quite rare. Because it is handled end-to-end, with no server support required, it is virtually impossible for some kind of virus to modify a digitally signed message in transit and add links to malicious websites, or for the message to have come from someone other than who it appears to have come from, with a properly-deployed and secured digital signature infrastructure.ĭigital signatures can also prevent corporate intrigue, such as a devious businessman intercepting a competitor's messages to alter the terms of contracts, change data in reports, or otherwise surreptitiously corrupt the message or attachments. When you receive a digitally signed e-mail, you can click on web links in the message and open the attachments, and trust they will be safe-so long as you trust the person who sent you the message, and trust the sender's implementation of digital signatures.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |