How can I apply message digest to the application so that user can validate the accuracy and completeness of the software

I have developed the application and now it’s time to distribute to my users. I was reviewing my application and reading security best practises and found below statement in one of the article.

Published software should p… Continue reading How can I apply message digest to the application so that user can validate the accuracy and completeness of the software

What is the difference between concealment and secrecy in context of confidentiality?

I just started studying up for the CISSP and am having trouble understanding few concepts.

This is regarding confidentiality, Below are some of the aspects of confidentiality

Sensitivity
Discretion
Criticality
Concealment
Secrecy
Priva… Continue reading What is the difference between concealment and secrecy in context of confidentiality?

What would happen to the connection when certificate expires? [duplicate]

This question already has an answer here:

We are using X509 certificate to connect between on-premise devices to the cloud services (Device provisioning service from Azure)

The expiry date of the certificate is 3 years from now.

Once the handshake is success between device and cloud, they send/receive messages continuously. So question, how does this connection verify if certificate is expired or not?

Continue reading What would happen to the connection when certificate expires? [duplicate]