how do webs of  trust and hierarchies of trust differ? ( choose all that apply)

Fundamentals of Information Systems
9th Edition
ISBN:9781337097536
Author:Ralph Stair, George Reynolds
Publisher:Ralph Stair, George Reynolds
Chapter8: System Acquisition And Development
Section: Chapter Questions
Problem 1.1CS: It is perhaps not surprising that Etsy was an early adopter of DevOps. It is a relatively small...
icon
Related questions
Question

how do webs of  trust and hierarchies of trust differ? ( choose all that apply)

A
B
с
D
0
Webs of trust, as peer-to-peer architectures, are not part of the IT logistics supply chain; hierarchies of trust work best when CAs become part of
the architecture of hardware, operating systems, browsers, and other applications.
Webs of trust work best when the peer trust anchors are incorporated into the IT logistics supply chain; hierarchies of trust do not need to have
information embedded in vendor-provided product systems such as operating systems or browsers.
Webs of trust are based on peer-to-peer architectures and as such are not very scalable to large numbers of users. Hierarchies of trust rely on
certificate authorities as publishers of intermediate certificates, which supports much larger numbers of users.
They are actually common terms for the same set of architectures and implementations.
Transcribed Image Text:A B с D 0 Webs of trust, as peer-to-peer architectures, are not part of the IT logistics supply chain; hierarchies of trust work best when CAs become part of the architecture of hardware, operating systems, browsers, and other applications. Webs of trust work best when the peer trust anchors are incorporated into the IT logistics supply chain; hierarchies of trust do not need to have information embedded in vendor-provided product systems such as operating systems or browsers. Webs of trust are based on peer-to-peer architectures and as such are not very scalable to large numbers of users. Hierarchies of trust rely on certificate authorities as publishers of intermediate certificates, which supports much larger numbers of users. They are actually common terms for the same set of architectures and implementations.
Expert Solution
trending now

Trending now

This is a popular solution!

steps

Step by step

Solved in 3 steps

Blurred answer
Knowledge Booster
System Model Approaches
Learn more about
Need a deep-dive on the concept behind this application? Look no further. Learn more about this topic, computer-science and related others by exploring similar questions and additional content below.
Similar questions
  • SEE MORE QUESTIONS
Recommended textbooks for you
Fundamentals of Information Systems
Fundamentals of Information Systems
Computer Science
ISBN:
9781337097536
Author:
Ralph Stair, George Reynolds
Publisher:
Cengage Learning