SlideShare a Scribd company logo
1 of 10
Safeguarding web resources
Dr. Irfan ul Haq Akhoon
Tools for Safe guarding Web Resources
 Digital Signature
 Encryption
 Watermarking etc.
Dr. Irfan ul Haq Akhoon
Digital Signature
 A digital signature is a mathematical scheme for verifying the authenticity of digital messages or
documents.
 A representation of assuring that the document meets all legal formalities and is authentic in its
framework.
 A digital signature can be used with any kind of message, whether it is encrypted or not, so that the
receiver can be sure of the sender's identity and that the message arrived intact.
 It is commonly used for software distribution, financial transactions, contract management software,
and in other cases where it is important to detect forgery or tampering.
Dr. Irfan ul Haq Akhoon
Advantages
 Makes a document a legal one.
 Authentication, identification of the person that signs.
 Integrity of data, every change will be detected.
 Non repudiation, because the author cannot be denied of his work (created and sent).
 Imposter prevention, Elimination of possibility of committing fraud by an imposter
Dr. Irfan ul Haq Akhoon
Disadvantages
 Its advantages are hampered by lost or theft of keys and use of vulnerable storage facilities.
 A number of Digital Signature standard exist which are incompatible with each other and
 There is a strong need of a standard through which these different methods (keys) can interact.
Dr. Irfan ul Haq Akhoon
Encryption
 Encryption is the conversion of data into a form, called a CIPHER Text.
 The use of encryption/decryption is as old as the art of communication.
 It is especially important when carrying out any kind of sensitive transaction in
wireless communications.
 Ex: A credit-card purchase online, or the discussion of a company secret between
different departments in the organization.
Dr. Irfan ul Haq Akhoon
Example
 Encryption depends on modifying or scrambling messages.
 So a key is necessary to understand the message.
 If the original message is
 ALLAHA IS GREAT
 Then the encrypted version depends on the key as follows:
 (key = 1) BMMBIB JT HSFBU
 (key = 2) CNNCJC KU ITGCV
 (key = 3) DOODKD LV JSHDW
Dr. Irfan ul Haq Akhoon
Watermark
 A distinguishing mark impressed on paper during manufacture; visible when paper is held up to
the light (e.g. $ Bill)
Dr. Irfan ul Haq Akhoon
Digital Watermarking
Digital Watermarking: Application of Information hiding (Hiding Watermarks in digital Media, such as images)
Digital Watermarking can be ?
- Perceptible (e.g. author information in .doc)
- Imperceptible (e.g. author information in images)
Dr. Irfan ul Haq Akhoon
Applications
Copyright Protection: To prove the ownership of digital media
Tamper proofing: To find out if data was tampered.
Quality Assessment: Degradation of Visual Quality
Authenticity: To authenticate the facts
Dr. Irfan ul Haq Akhoon

More Related Content

Similar to Safeguarding web resources.pptx

ROBUST WATERMARKING METHOD FOR SECURE TRANSMISSION OF MEDICAL IMAGES IN EHR S...
ROBUST WATERMARKING METHOD FOR SECURE TRANSMISSION OF MEDICAL IMAGES IN EHR S...ROBUST WATERMARKING METHOD FOR SECURE TRANSMISSION OF MEDICAL IMAGES IN EHR S...
ROBUST WATERMARKING METHOD FOR SECURE TRANSMISSION OF MEDICAL IMAGES IN EHR S...
ijcsit
 
1. Original Post by Catherine JohnsonCryptographic MethodsC
1. Original Post by Catherine JohnsonCryptographic MethodsC1. Original Post by Catherine JohnsonCryptographic MethodsC
1. Original Post by Catherine JohnsonCryptographic MethodsC
SantosConleyha
 
1. Original Post by Catherine JohnsonCryptographic MethodsC
1. Original Post by Catherine JohnsonCryptographic MethodsC1. Original Post by Catherine JohnsonCryptographic MethodsC
1. Original Post by Catherine JohnsonCryptographic MethodsC
AbbyWhyte974
 

Similar to Safeguarding web resources.pptx (20)

Study, analysis and formulation of a new method for integrity protection of d...
Study, analysis and formulation of a new method for integrity protection of d...Study, analysis and formulation of a new method for integrity protection of d...
Study, analysis and formulation of a new method for integrity protection of d...
 
digital signature ppt
digital signature pptdigital signature ppt
digital signature ppt
 
Are E-signatures Worth it?
Are E-signatures Worth it?Are E-signatures Worth it?
Are E-signatures Worth it?
 
Strengthening Online Security with eSignatures.pdf
Strengthening Online Security with eSignatures.pdfStrengthening Online Security with eSignatures.pdf
Strengthening Online Security with eSignatures.pdf
 
Digital signature and certificate authority
Digital signature and certificate authorityDigital signature and certificate authority
Digital signature and certificate authority
 
Document security & firewall
Document security & firewallDocument security & firewall
Document security & firewall
 
Robust Watermarking Method for Secure Transmission of Medical Images in EHR S...
Robust Watermarking Method for Secure Transmission of Medical Images in EHR S...Robust Watermarking Method for Secure Transmission of Medical Images in EHR S...
Robust Watermarking Method for Secure Transmission of Medical Images in EHR S...
 
ROBUST WATERMARKING METHOD FOR SECURE TRANSMISSION OF MEDICAL IMAGES IN EHR S...
ROBUST WATERMARKING METHOD FOR SECURE TRANSMISSION OF MEDICAL IMAGES IN EHR S...ROBUST WATERMARKING METHOD FOR SECURE TRANSMISSION OF MEDICAL IMAGES IN EHR S...
ROBUST WATERMARKING METHOD FOR SECURE TRANSMISSION OF MEDICAL IMAGES IN EHR S...
 
Std 12 Computer Chapter 5 Introduction to Mcommerce (Part 2)
Std 12 Computer Chapter 5  Introduction to Mcommerce (Part 2)Std 12 Computer Chapter 5  Introduction to Mcommerce (Part 2)
Std 12 Computer Chapter 5 Introduction to Mcommerce (Part 2)
 
Whitepaper: Secure By Design
Whitepaper: Secure By DesignWhitepaper: Secure By Design
Whitepaper: Secure By Design
 
Why eSignatures are Imperative for Data Security.pdf
Why eSignatures are Imperative for Data Security.pdfWhy eSignatures are Imperative for Data Security.pdf
Why eSignatures are Imperative for Data Security.pdf
 
Ppt
PptPpt
Ppt
 
E-Commerce security
E-Commerce security E-Commerce security
E-Commerce security
 
DIGITAL SIGNATURE PPT
DIGITAL SIGNATURE PPTDIGITAL SIGNATURE PPT
DIGITAL SIGNATURE PPT
 
Ds over
Ds overDs over
Ds over
 
Digital Signature.pptx
Digital Signature.pptxDigital Signature.pptx
Digital Signature.pptx
 
Difference Between Digital Signature and Electronic Signature.pdf
Difference Between Digital Signature and Electronic Signature.pdfDifference Between Digital Signature and Electronic Signature.pdf
Difference Between Digital Signature and Electronic Signature.pdf
 
1. Original Post by Catherine JohnsonCryptographic MethodsC
1. Original Post by Catherine JohnsonCryptographic MethodsC1. Original Post by Catherine JohnsonCryptographic MethodsC
1. Original Post by Catherine JohnsonCryptographic MethodsC
 
1. Original Post by Catherine JohnsonCryptographic MethodsC
1. Original Post by Catherine JohnsonCryptographic MethodsC1. Original Post by Catherine JohnsonCryptographic MethodsC
1. Original Post by Catherine JohnsonCryptographic MethodsC
 
DrySign E-signatures: The Mobile Solution for Modern Businesses
DrySign E-signatures: The Mobile Solution for Modern BusinessesDrySign E-signatures: The Mobile Solution for Modern Businesses
DrySign E-signatures: The Mobile Solution for Modern Businesses
 

More from DrIrfanulHaqAkhoon

More from DrIrfanulHaqAkhoon (20)

Server its functions and types.pptx
Server its functions and types.pptxServer its functions and types.pptx
Server its functions and types.pptx
 
Windows Operating System.pptx
Windows Operating System.pptxWindows Operating System.pptx
Windows Operating System.pptx
 
Disk Operating System.pptx
Disk Operating System.pptxDisk Operating System.pptx
Disk Operating System.pptx
 
Operating Systems Genesis, Development and Functions m.pptx
Operating Systems Genesis, Development and Functions  m.pptxOperating Systems Genesis, Development and Functions  m.pptx
Operating Systems Genesis, Development and Functions m.pptx
 
Peripheral Devies.ppt
Peripheral Devies.pptPeripheral Devies.ppt
Peripheral Devies.ppt
 
Generations & Development of Computers.pptx
Generations & Development of Computers.pptxGenerations & Development of Computers.pptx
Generations & Development of Computers.pptx
 
Computer Genesis Functions and Components.pptx
Computer Genesis Functions and Components.pptxComputer Genesis Functions and Components.pptx
Computer Genesis Functions and Components.pptx
 
Information Technology its components.pptx
Information Technology its components.pptxInformation Technology its components.pptx
Information Technology its components.pptx
 
Modes of Research.pptx
Modes of Research.pptxModes of Research.pptx
Modes of Research.pptx
 
Review of Literature.pptx
Review of Literature.pptxReview of Literature.pptx
Review of Literature.pptx
 
Research Proposal.pptx
Research Proposal.pptxResearch Proposal.pptx
Research Proposal.pptx
 
mendely.pptx
mendely.pptxmendely.pptx
mendely.pptx
 
research.pptx
research.pptxresearch.pptx
research.pptx
 
SPSS.pptx
SPSS.pptxSPSS.pptx
SPSS.pptx
 
hypotheses.pptx
hypotheses.pptxhypotheses.pptx
hypotheses.pptx
 
Research Report writing.pptx
Research Report writing.pptxResearch Report writing.pptx
Research Report writing.pptx
 
Research Communities.pptx
Research Communities.pptxResearch Communities.pptx
Research Communities.pptx
 
Web 3.0.pptx
Web 3.0.pptxWeb 3.0.pptx
Web 3.0.pptx
 
Artificial Intelligence.pptx
Artificial Intelligence.pptxArtificial Intelligence.pptx
Artificial Intelligence.pptx
 
Controlled Vocabullary.pptx
Controlled Vocabullary.pptxControlled Vocabullary.pptx
Controlled Vocabullary.pptx
 

Recently uploaded

Gardella_Mateo_IntellectualProperty.pdf.
Gardella_Mateo_IntellectualProperty.pdf.Gardella_Mateo_IntellectualProperty.pdf.
Gardella_Mateo_IntellectualProperty.pdf.
MateoGardella
 
Gardella_PRCampaignConclusion Pitch Letter
Gardella_PRCampaignConclusion Pitch LetterGardella_PRCampaignConclusion Pitch Letter
Gardella_PRCampaignConclusion Pitch Letter
MateoGardella
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
PECB
 
An Overview of Mutual Funds Bcom Project.pdf
An Overview of Mutual Funds Bcom Project.pdfAn Overview of Mutual Funds Bcom Project.pdf
An Overview of Mutual Funds Bcom Project.pdf
SanaAli374401
 
Seal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxSeal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptx
negromaestrong
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
kauryashika82
 
Making and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdfMaking and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdf
Chris Hunter
 

Recently uploaded (20)

Class 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfClass 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdf
 
Unit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxUnit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptx
 
Gardella_Mateo_IntellectualProperty.pdf.
Gardella_Mateo_IntellectualProperty.pdf.Gardella_Mateo_IntellectualProperty.pdf.
Gardella_Mateo_IntellectualProperty.pdf.
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptx
 
Gardella_PRCampaignConclusion Pitch Letter
Gardella_PRCampaignConclusion Pitch LetterGardella_PRCampaignConclusion Pitch Letter
Gardella_PRCampaignConclusion Pitch Letter
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17
 
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
 
An Overview of Mutual Funds Bcom Project.pdf
An Overview of Mutual Funds Bcom Project.pdfAn Overview of Mutual Funds Bcom Project.pdf
An Overview of Mutual Funds Bcom Project.pdf
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdf
 
Seal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxSeal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptx
 
Unit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxUnit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptx
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.ppt
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
Making and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdfMaking and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdf
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
Advance Mobile Application Development class 07
Advance Mobile Application Development class 07Advance Mobile Application Development class 07
Advance Mobile Application Development class 07
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impact
 

Safeguarding web resources.pptx

  • 1. Safeguarding web resources Dr. Irfan ul Haq Akhoon
  • 2. Tools for Safe guarding Web Resources  Digital Signature  Encryption  Watermarking etc. Dr. Irfan ul Haq Akhoon
  • 3. Digital Signature  A digital signature is a mathematical scheme for verifying the authenticity of digital messages or documents.  A representation of assuring that the document meets all legal formalities and is authentic in its framework.  A digital signature can be used with any kind of message, whether it is encrypted or not, so that the receiver can be sure of the sender's identity and that the message arrived intact.  It is commonly used for software distribution, financial transactions, contract management software, and in other cases where it is important to detect forgery or tampering. Dr. Irfan ul Haq Akhoon
  • 4. Advantages  Makes a document a legal one.  Authentication, identification of the person that signs.  Integrity of data, every change will be detected.  Non repudiation, because the author cannot be denied of his work (created and sent).  Imposter prevention, Elimination of possibility of committing fraud by an imposter Dr. Irfan ul Haq Akhoon
  • 5. Disadvantages  Its advantages are hampered by lost or theft of keys and use of vulnerable storage facilities.  A number of Digital Signature standard exist which are incompatible with each other and  There is a strong need of a standard through which these different methods (keys) can interact. Dr. Irfan ul Haq Akhoon
  • 6. Encryption  Encryption is the conversion of data into a form, called a CIPHER Text.  The use of encryption/decryption is as old as the art of communication.  It is especially important when carrying out any kind of sensitive transaction in wireless communications.  Ex: A credit-card purchase online, or the discussion of a company secret between different departments in the organization. Dr. Irfan ul Haq Akhoon
  • 7. Example  Encryption depends on modifying or scrambling messages.  So a key is necessary to understand the message.  If the original message is  ALLAHA IS GREAT  Then the encrypted version depends on the key as follows:  (key = 1) BMMBIB JT HSFBU  (key = 2) CNNCJC KU ITGCV  (key = 3) DOODKD LV JSHDW Dr. Irfan ul Haq Akhoon
  • 8. Watermark  A distinguishing mark impressed on paper during manufacture; visible when paper is held up to the light (e.g. $ Bill) Dr. Irfan ul Haq Akhoon
  • 9. Digital Watermarking Digital Watermarking: Application of Information hiding (Hiding Watermarks in digital Media, such as images) Digital Watermarking can be ? - Perceptible (e.g. author information in .doc) - Imperceptible (e.g. author information in images) Dr. Irfan ul Haq Akhoon
  • 10. Applications Copyright Protection: To prove the ownership of digital media Tamper proofing: To find out if data was tampered. Quality Assessment: Degradation of Visual Quality Authenticity: To authenticate the facts Dr. Irfan ul Haq Akhoon