11.07.2015 Views

Encyclopedia of Computer Science and Technology

Encyclopedia of Computer Science and Technology

Encyclopedia of Computer Science and Technology

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

certification <strong>of</strong> computer pr<strong>of</strong>essionals 79program for accepting tax returns that are digitally certified<strong>and</strong> signed.Further ReadingAltreya, Mohan, et al. Digital Signatures. Berkeley, Calif.: Osborne/McGraw-Hill, 2002.Br<strong>and</strong>s, Stefan A. Rethinking Public Key Infrastructures <strong>and</strong> DigitalCertificates. Cambridge, Mass.: MIT Press, 2000.Feghhi, Jalal, <strong>and</strong> Peter Williams. Digital Certificates: AppliedInternet Security. Reading, Mass.: Addison-Wesley, 1998.Digital certification relies upon public key cryptography <strong>and</strong> theexistence <strong>of</strong> a trusted third party, the Certificate Authority (CA).First a business properly identifies itself to the CA <strong>and</strong> receives adigital certificate. A consumer can obtain a copy <strong>of</strong> the business’sdigital certificate <strong>and</strong> use it to obtain the business’s public key fromthe CA. The consumer can now send encrypted information (suchas a credit card number) to the business.cant <strong>and</strong> then provides the company with a digital certificate,which is actually the company’s public key encryptedtogether with a key used by the CA <strong>and</strong> a text message.(This is sometimes called a digital signature.) When a userqueries the Web site, the user’s browser uses the CA’s publickey to decrypt the certificate holder’s public key. Thatpublic key is used in turn to decrypt the accompanyingmessage. If the message text matches, this proves that thecertificate is valid (unless the CA’s private key has somehowbeen compromised).The supporting technology for digital certification isincluded in a st<strong>and</strong>ard called Secure Sockets Layer (SSL),which is a protocol for sending encrypted data across theInternet. SSL is supported by leading browsers such asMicros<strong>of</strong>t Internet Explorer <strong>and</strong> Netscape. As a result, digitalcertification is usually transparent to the user, unlessthe user is notified that a certificate cannot be verified.Digital certificates are <strong>of</strong>ten attached to s<strong>of</strong>tware such asbrowser plug-ins so the user can verify before installationthat the s<strong>of</strong>tware actually originates with its manufacturer<strong>and</strong> has not been tampered with (such as by introduction <strong>of</strong>a virus).The use <strong>of</strong> digital certification is exp<strong>and</strong>ing. For example,VeriSign <strong>and</strong> the federal General Services Administration(GSA) have begun an initiative called ACES (AccessCertificates for Electronic Services) that will allow citizensa secure means to send information (such as loan applications)<strong>and</strong> to view benefits records. The IRS has a pilotcertification <strong>of</strong> computer pr<strong>of</strong>essionalsUnlike medicine, the law, or even civil engineering, thecomputer-related fields do not have legally required certification.Given society’s critical dependence on computers<strong>of</strong>tware <strong>and</strong> hardware for areas such as infrastructuremanagement <strong>and</strong> medical applications, there have beenpersistent attempts to require certification or licensing <strong>of</strong>s<strong>of</strong>tware engineers. However, the fluid nature <strong>of</strong> the informationscience field would make it difficult to decide whichapplication areas should have entry restrictions.At present, a variety <strong>of</strong> academic degrees, pr<strong>of</strong>essionalaffiliations, <strong>and</strong> industry certificates may be considered inevaluating a c<strong>and</strong>idate for a position in the computing field.Academic <strong>and</strong> Pr<strong>of</strong>essional CredentialsThe field <strong>of</strong> computer science has the usual levels <strong>of</strong> academiccredentials (baccalaureate, master’s, <strong>and</strong> doctoraldegrees), <strong>and</strong> these are <strong>of</strong>ten considered prerequisites foran academic position or for industry positions that involveresearch or development in areas such as robotics or artificialintelligence. For business-oriented IT positions, abachelor’s degree in computer science or information systemsmay be required or preferred, <strong>and</strong> c<strong>and</strong>idates whoalso have a business-oriented degree (such as an MBA) maybe in a stronger position. However, degrees are generallyviewed only as a minimum qualification (or “filter”) beforeevaluating experience in the specific application or platformin question. While not a certification, membership in themajor pr<strong>of</strong>essional organizations such as the Associationfor Computing Machinery (ACM) <strong>and</strong> Institute for Electrical<strong>and</strong> Electronic Engineers (IEEE) can be viewed as part<strong>of</strong> pr<strong>of</strong>essional status. Through special interest groups <strong>and</strong>forums, these organizations provide computer pr<strong>of</strong>essionalswith a good way to track emerging technical developmentsor to broaden their knowledge.In the early years <strong>of</strong> computing <strong>and</strong> again, in the microcomputerindustry <strong>of</strong> the 1980s, programming experience<strong>and</strong> ability were valued more highly than academic credentials.(Bill Gates, for example, had no formal college trainingin computer science.) In general, degree or certificationrequirements tend to be imposed as a sector <strong>of</strong> the informationindustry becomes well defined <strong>and</strong> established in thecorporate world. For example, as local area networks cameinto widespread use in the 1980s, certifications were developedby Micros<strong>of</strong>t, Novell, <strong>and</strong> others. In turn, colleges<strong>and</strong> trade schools can train technicians, using the certificateexaminations to establish a curriculum, <strong>and</strong> numerousbooks <strong>and</strong> packaged training courses have been marketed.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!