Describe the vulnerability involved in accessing a web site with an unsigned public key.

Explain the risks involved with using SSL where the server’s public key is signed and where the server’s public key is not signed. Include examples where risk is too high and where the risk is probably not too high. In your description, be sure to include the following
Describe the vulnerability involved in accessing a web site with an unsigned public key.
Describe the vulnerability involved in accessing a web site with a signed public key.
Describe a scenario where the risk of having an unsigned public key is acceptable
Describe a scenario where the risk of having an unsigned public key is not acceptable but the risk of having a signed public key is acceptable
Describe a scenario where risk of using a signed public key is not acceptable

"Get 15% discount on your first 3 orders with us"
Use the following coupon
FIRST15

Order Now