{"title":"Vulnerability and Exploitation of Digital Certificates","authors":"M. Radif","doi":"10.1109/NTCCIT.2018.8681179","DOIUrl":"https://doi.org/10.1109/NTCCIT.2018.8681179","url":null,"abstract":"This research paper will provide an overview of the motivations, techniques, tactics, and procedures of cybercrime actors who misuse and exploit digital certificates and cryptographic key technologies for malicious intentions. The paper will focus on digital certificates and the role of PKI in the creation of trust among the involved entities. The paper will also focus on the vulnerability of digital certificate algorithm to exploitation. It will focus on the real-world scenarios where malicious actors have used digital certificates and cryptographic keys to commit a crime. The paper will also focus on the implications of the crime committed and the best practice that can be employed by companies to ensure their system minimizes risks of attack by hackers.","PeriodicalId":123568,"journal":{"name":"2018 Al-Mansour International Conference on New Trends in Computing, Communication, and Information Technology (NTCCIT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121036854","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}