SlideShare a Scribd company logo
Digital Certificate
Digital certificate is issued by a trusted third party which proves sender’s identity to the
receiver and receiver’s identity to the sender.
A digital certificate is a certificate issued by a Certificate Authority (CA) to verify the
identity of the certificate holder. The CA issues an encrypted digital certificate containing
the applicant’s public key and a variety of other identification information. Digital
certificate is used to attach public key with a particular individual or an entity.
Digital certificate contains:- The authenticity
1. Name of certificate holder.
2. Serial number which is used to uniquely identify a certificate, the individual or the
entity identified by the certificate
3. Expiration dates.
4. Copy of certificate holder’s public key.(used for decrypting messages and digital
signatures)
5. Digital Signature of the certificate issuing authority.
Digital certificate is also sent with the digital signature and the message.
Digital certificate vs digital signature :
Digital signature is used to verify authenticity, integrity, non-repudiation ,i.e. it is assuring that
the message is sent by the known user and not modified, while digital certificate is used to
verify the identity of the user, maybe sender or receiver. Thus, digital signature and certificate
are different kind of things but both are used for security. Most websites use digital certificate
to enhance trust of their users
Feature Digital Signature Digital Certificate
Basics /
Definition
Digital signature is like a fingerprint or an
attachment to a digital document that ensures
its authenticity and integrity.
Digital certificate is a file that ensures holder’s
identity and provides security.
Process / Steps
Hashed value of original message is encrypted
with sender’s secret key to generate the digital
signature.
It is generated by CA (Certifying Authority) that
involves four steps: Key Generation, Registration,
Verification, Creation.
Security
Services
Authenticity of Sender, integrity of the
document and non-repudiation.
It provides security and authenticity of
certificate holder.
Standard It follows Digital Signature Standard (DSS). It follows X.509 Standard Format
Public key– Key which is known to everyone. Ex-public key of A is 7, this information
is known to everyone.
Private key– Key which is only known to the person who’s private key it is.
Digital Signature
A digital signature is a mathematical technique used to validate the authenticity and
integrity of a message, software, or digital document.
Digital signature is electronic signatures, which assure that the message was sent by
a particular sender. While performing digital transactions authenticity and integrity
should be assured, otherwise, the data can be altered or someone can also act as if
he was the sender and expect a reply
Types of Internet Security Protocols
In today’s world, we transfer the data in bulk, and the security of this data is very important,
so Internet security provides that feature i.e., protection of data. There are different types of
protocol exist like routing, mail transfer, and remote communication protocol. But the Internet
security protocol helps in the security and integrity of data over the internet. There are many
protocols that exist that help in the security of data over the internet such as Secure Socket
Layer (SSL), Transport Layer Security (TLS).
SSL Protocol :
•SSL Protocol stands for Secure Sockets Layer protocol, which is an encryption-based
Internet security protocol that protects confidentiality and integrity of data.
•SSL is used to ensure the privacy and authenticity of data over the internet.
•SSL is located between the application and transport layers.
•At first, SSL contained security flaws and was quickly replaced by the first version of
TLS that’s why SSL is the predecessor of the modern TLS encryption.
•TLS/SSL website has “HTTPS” in its URL rather than “HTTP”.
•SSL is divided into three sub-protocols: the Handshake Protocol, the Record
Protocol, and the Alert Protocol.
TLS Protocol :
•Same as SSL, TLS which stands for Transport Layer Security is widely used for the
privacy and security of data over the internet.
•TLS uses a pseudo-random algorithm to generate the master secret which is a key
used for the encryption between the protocol client and protocol server.
•TLS is basically used for encrypting communication between online servers like a
web browser loading a web page in the online server.
•TLS also has three sub-protocols the same as SSL protocol – Handshake Protocol,
Record Protocol, and Alert Protocol.
SHTTP :
•SHTTP stands for Secure HyperText Transfer Protocol, which is a collection of
security measures like Establishing strong passwords, setting up a firewall, thinking
of antivirus protection, and so on designed to secure internet communication.
•SHTTP includes data entry forms that are used to input data, which has previously
been collected into a database. As well as internet-based transactions.
•SHTTP’s services are quite comparable to those of the SSL protocol.
•Secure HyperText Transfer Protocol works at the application layer (that defines the
shared communications protocols and interface methods used by hosts in a network)
and is thus closely linked with HTTP.
•SHTTP can authenticate and encrypt HTTP traffic between the client and the server.
•SHTTP operates on a message-by-message basis. It can encrypt and sign individual
messages.
Types of Firewalls in Network Security
Nowadays, protecting our sensitive data from unauthorized and unwanted sources has
become a significant challenge. There are numerous tools available that can provide various
levels of security and aid in the protection of private information stored in any system. A
‘firewall’ is a network security mechanism that protects our systems and data against
unauthorized access.
A firewall is a cybersecurity device or software application that filters network traffic. A
firewall acts as a traffic cop at your computer’s port. A fundamental purpose of a firewall
is to create a barrier that separates an internal network from incoming external traffic to
block malicious traffic requests and data packets, such as malware and hacking while
allowing legitimate traffic to pass through. A firewall enables only the traffic that has
been configured to accept, like IP addresses. It differentiates between legitimate and
malicious traffic and allows or blocks specific data packets based on predefined security
rules.
A Firewall is a necessary component of a company’s overall cybersecurity strategy. Most
computers have an in-built firewall, but it isn’t always the best option for security. What
can a firewall do to keep us safe?
It guards computers against unauthorized access.
It blocks unwanted content.
It provides a secure network when multiple people interact at the same time.
It prevents ransomware from spreading.
It protects private information, such as online banking credentials.
Types of Network Firewall :
Packet Filters –
It is a technique used to control network access by monitoring outgoing and incoming
packets and allowing them to pass or halt based on the source and destination Internet
Protocol (IP) addresses, protocols, and ports. This firewall is also known as a static
firewall.
Stateful Inspection Firewalls –
It is also a type of packet filtering which is used to control how data packets move
through a firewall. It is also called dynamic packet filtering. These firewalls can inspect
that if the packet belongs to a particular session or not. It only permits communication if
and only if, the session is perfectly established between two endpoints else it will block
the communication.
Application Layer Firewalls –
These firewalls can examine application layer (of OSI model) information like an HTTP
request. If finds some suspicious application that can be responsible for harming our
network or that is not safe for our network then it gets blocked right away.
Next-generation Firewalls –
These firewalls are called intelligent firewalls. These firewalls can perform all the tasks that
are performed by the other types of firewalls that we learned previously but on top of that, it
includes additional features like application awareness and control, integrated intrusion
prevention, and cloud-delivered threat intelligence.
Circuit-level gateways –
A circuit-level gateway is a firewall that provides User Datagram Protocol (UDP) and
Transmission Control Protocol (TCP) connection security and works between an Open
Systems Interconnection (OSI) network model’s transport and application layers such
as the session layer.
Software Firewall –
The software firewall is a type of computer software that runs on our computers. It protects
our system from any external attacks such as unauthorized access, malicious attacks, etc. by
notifying us about the danger that can occur if we open a particular mail or if we try to open
a website that is not secure.
Hardware Firewall –
A hardware firewall is a physical appliance that is deployed to enforce a network boundary.
All network links crossing this boundary pass-through this firewall, which enables it to
perform an inspection of both inbound and outbound network traffic and enforce access
controls and other security policies.
Cloud Firewall –
These are software-based, cloud-deployed network devices. This cloud-based firewall
protects a private network from any unwanted access. Unlike traditional firewalls, a cloud
firewall filters data at the cloud level.

More Related Content

Similar to ebusiness digital,E business signature .

MOBILE & WIRELESS SECURITY And MOBILE & WIRELESS SECURITY
MOBILE & WIRELESS SECURITY And MOBILE & WIRELESS SECURITYMOBILE & WIRELESS SECURITY And MOBILE & WIRELESS SECURITY
MOBILE & WIRELESS SECURITY And MOBILE & WIRELESS SECURITY
DEEPAK948083
 
Network security model.pptx
Network security model.pptxNetwork security model.pptx
Network security model.pptx
ssuserd24233
 
Network Security
Network SecurityNetwork Security
Network Security
Beth Hall
 
IS-Crypttools.pptx
IS-Crypttools.pptxIS-Crypttools.pptx
IMPLEMENTATION OF METHODS FOR TRANSACTION IN SECURE ONLINE BANKING
IMPLEMENTATION OF METHODS FOR TRANSACTION IN SECURE ONLINE BANKINGIMPLEMENTATION OF METHODS FOR TRANSACTION IN SECURE ONLINE BANKING
IMPLEMENTATION OF METHODS FOR TRANSACTION IN SECURE ONLINE BANKING
International Journal of Technical Research & Application
 
Demonstration of secure socket layer(synopsis)
Demonstration of secure socket layer(synopsis)Demonstration of secure socket layer(synopsis)
Demonstration of secure socket layer(synopsis)
Mumbai Academisc
 
Vulnerabilities of the SSL/TLS Protocol
Vulnerabilities of the SSL/TLS ProtocolVulnerabilities of the SSL/TLS Protocol
Vulnerabilities of the SSL/TLS Protocol
csandit
 
VULNERABILITIES OF THE SSL/TLS PROTOCOL
VULNERABILITIES OF THE SSL/TLS PROTOCOLVULNERABILITIES OF THE SSL/TLS PROTOCOL
VULNERABILITIES OF THE SSL/TLS PROTOCOL
cscpconf
 
SECURITY PROTOCOLS.ppt
SECURITY PROTOCOLS.pptSECURITY PROTOCOLS.ppt
SECURITY PROTOCOLS.ppt
DimpyJindal4
 
security issue
security issuesecurity issue
security issue
JAINIK PATEL
 
Communications Technologies
Communications TechnologiesCommunications Technologies
Communications Technologies
Sarah Jimenez
 
Web Security
Web SecurityWeb Security
Web Security
Dr.Florence Dayana
 
cybersecurity
cybersecuritycybersecurity
cybersecurity
maha797959
 
Security
SecuritySecurity
Security
majstors
 
Secrity project keyvan
Secrity project   keyvanSecrity project   keyvan
Secrity project keyvan
itrraincity
 
E-Commerce security
E-Commerce security E-Commerce security
E-Commerce security
Tawhid Rahman
 
ITFT - Web security
ITFT - Web securityITFT - Web security
ITFT - Web security
Blossom Sood
 
Types of Networks Week7 Part4-IS RevisionSu2013 .docx
Types of Networks  Week7 Part4-IS RevisionSu2013 .docxTypes of Networks  Week7 Part4-IS RevisionSu2013 .docx
Types of Networks Week7 Part4-IS RevisionSu2013 .docx
willcoxjanay
 
firewall as a security measure (1)-1.pptx
firewall as a security measure (1)-1.pptxfirewall as a security measure (1)-1.pptx
firewall as a security measure (1)-1.pptx
ShreyaBanerjee52
 
CTO-CybersecurityForum-2010-RonWilliams
CTO-CybersecurityForum-2010-RonWilliamsCTO-CybersecurityForum-2010-RonWilliams
CTO-CybersecurityForum-2010-RonWilliams
segughana
 

Similar to ebusiness digital,E business signature . (20)

MOBILE & WIRELESS SECURITY And MOBILE & WIRELESS SECURITY
MOBILE & WIRELESS SECURITY And MOBILE & WIRELESS SECURITYMOBILE & WIRELESS SECURITY And MOBILE & WIRELESS SECURITY
MOBILE & WIRELESS SECURITY And MOBILE & WIRELESS SECURITY
 
Network security model.pptx
Network security model.pptxNetwork security model.pptx
Network security model.pptx
 
Network Security
Network SecurityNetwork Security
Network Security
 
IS-Crypttools.pptx
IS-Crypttools.pptxIS-Crypttools.pptx
IS-Crypttools.pptx
 
IMPLEMENTATION OF METHODS FOR TRANSACTION IN SECURE ONLINE BANKING
IMPLEMENTATION OF METHODS FOR TRANSACTION IN SECURE ONLINE BANKINGIMPLEMENTATION OF METHODS FOR TRANSACTION IN SECURE ONLINE BANKING
IMPLEMENTATION OF METHODS FOR TRANSACTION IN SECURE ONLINE BANKING
 
Demonstration of secure socket layer(synopsis)
Demonstration of secure socket layer(synopsis)Demonstration of secure socket layer(synopsis)
Demonstration of secure socket layer(synopsis)
 
Vulnerabilities of the SSL/TLS Protocol
Vulnerabilities of the SSL/TLS ProtocolVulnerabilities of the SSL/TLS Protocol
Vulnerabilities of the SSL/TLS Protocol
 
VULNERABILITIES OF THE SSL/TLS PROTOCOL
VULNERABILITIES OF THE SSL/TLS PROTOCOLVULNERABILITIES OF THE SSL/TLS PROTOCOL
VULNERABILITIES OF THE SSL/TLS PROTOCOL
 
SECURITY PROTOCOLS.ppt
SECURITY PROTOCOLS.pptSECURITY PROTOCOLS.ppt
SECURITY PROTOCOLS.ppt
 
security issue
security issuesecurity issue
security issue
 
Communications Technologies
Communications TechnologiesCommunications Technologies
Communications Technologies
 
Web Security
Web SecurityWeb Security
Web Security
 
cybersecurity
cybersecuritycybersecurity
cybersecurity
 
Security
SecuritySecurity
Security
 
Secrity project keyvan
Secrity project   keyvanSecrity project   keyvan
Secrity project keyvan
 
E-Commerce security
E-Commerce security E-Commerce security
E-Commerce security
 
ITFT - Web security
ITFT - Web securityITFT - Web security
ITFT - Web security
 
Types of Networks Week7 Part4-IS RevisionSu2013 .docx
Types of Networks  Week7 Part4-IS RevisionSu2013 .docxTypes of Networks  Week7 Part4-IS RevisionSu2013 .docx
Types of Networks Week7 Part4-IS RevisionSu2013 .docx
 
firewall as a security measure (1)-1.pptx
firewall as a security measure (1)-1.pptxfirewall as a security measure (1)-1.pptx
firewall as a security measure (1)-1.pptx
 
CTO-CybersecurityForum-2010-RonWilliams
CTO-CybersecurityForum-2010-RonWilliamsCTO-CybersecurityForum-2010-RonWilliams
CTO-CybersecurityForum-2010-RonWilliams
 

Recently uploaded

Business storytelling: key ingredients to a story
Business storytelling: key ingredients to a storyBusiness storytelling: key ingredients to a story
Business storytelling: key ingredients to a story
Alexandra Fulford
 
amptalk_RecruitingDeck_english_2024.06.05
amptalk_RecruitingDeck_english_2024.06.05amptalk_RecruitingDeck_english_2024.06.05
amptalk_RecruitingDeck_english_2024.06.05
marketing317746
 
Satta Matka Dpboss Matka Guessing Kalyan Chart Indian Matka Kalyan panel Chart
Satta Matka Dpboss Matka Guessing Kalyan Chart Indian Matka Kalyan panel ChartSatta Matka Dpboss Matka Guessing Kalyan Chart Indian Matka Kalyan panel Chart
Satta Matka Dpboss Matka Guessing Kalyan Chart Indian Matka Kalyan panel Chart
➒➌➎➏➑➐➋➑➐➐Dpboss Matka Guessing Satta Matka Kalyan Chart Indian Matka
 
Anny Serafina Love - Letter of Recommendation by Kellen Harkins, MS.
Anny Serafina Love - Letter of Recommendation by Kellen Harkins, MS.Anny Serafina Love - Letter of Recommendation by Kellen Harkins, MS.
Anny Serafina Love - Letter of Recommendation by Kellen Harkins, MS.
AnnySerafinaLove
 
Best Forex Brokers Comparison in INDIA 2024
Best Forex Brokers Comparison in INDIA 2024Best Forex Brokers Comparison in INDIA 2024
Best Forex Brokers Comparison in INDIA 2024
Top Forex Brokers Review
 
Training my puppy and implementation in this story
Training my puppy and implementation in this storyTraining my puppy and implementation in this story
Training my puppy and implementation in this story
WilliamRodrigues148
 
一比一原版新西兰奥塔哥大学毕业证(otago毕业证)如何办理
一比一原版新西兰奥塔哥大学毕业证(otago毕业证)如何办理一比一原版新西兰奥塔哥大学毕业证(otago毕业证)如何办理
一比一原版新西兰奥塔哥大学毕业证(otago毕业证)如何办理
taqyea
 
ikea_woodgreen_petscharity_dog-alogue_digital.pdf
ikea_woodgreen_petscharity_dog-alogue_digital.pdfikea_woodgreen_petscharity_dog-alogue_digital.pdf
ikea_woodgreen_petscharity_dog-alogue_digital.pdf
agatadrynko
 
LA HUG - Video Testimonials with Chynna Morgan - June 2024
LA HUG - Video Testimonials with Chynna Morgan - June 2024LA HUG - Video Testimonials with Chynna Morgan - June 2024
LA HUG - Video Testimonials with Chynna Morgan - June 2024
Lital Barkan
 
ModelingMarketingStrategiesMKS.CollumbiaUniversitypdf
ModelingMarketingStrategiesMKS.CollumbiaUniversitypdfModelingMarketingStrategiesMKS.CollumbiaUniversitypdf
ModelingMarketingStrategiesMKS.CollumbiaUniversitypdf
fisherameliaisabella
 
The Influence of Marketing Strategy and Market Competition on Business Perfor...
The Influence of Marketing Strategy and Market Competition on Business Perfor...The Influence of Marketing Strategy and Market Competition on Business Perfor...
The Influence of Marketing Strategy and Market Competition on Business Perfor...
Adam Smith
 
Creative Web Design Company in Singapore
Creative Web Design Company in SingaporeCreative Web Design Company in Singapore
Creative Web Design Company in Singapore
techboxsqauremedia
 
Event Report - SAP Sapphire 2024 Orlando - lots of innovation and old challenges
Event Report - SAP Sapphire 2024 Orlando - lots of innovation and old challengesEvent Report - SAP Sapphire 2024 Orlando - lots of innovation and old challenges
Event Report - SAP Sapphire 2024 Orlando - lots of innovation and old challenges
Holger Mueller
 
Authentically Social by Corey Perlman - EO Puerto Rico
Authentically Social by Corey Perlman - EO Puerto RicoAuthentically Social by Corey Perlman - EO Puerto Rico
Authentically Social by Corey Perlman - EO Puerto Rico
Corey Perlman, Social Media Speaker and Consultant
 
Understanding User Needs and Satisfying Them
Understanding User Needs and Satisfying ThemUnderstanding User Needs and Satisfying Them
Understanding User Needs and Satisfying Them
Aggregage
 
Chapter 7 Final business management sciences .ppt
Chapter 7 Final business management sciences .pptChapter 7 Final business management sciences .ppt
Chapter 7 Final business management sciences .ppt
ssuser567e2d
 
Lundin Gold Corporate Presentation - June 2024
Lundin Gold Corporate Presentation - June 2024Lundin Gold Corporate Presentation - June 2024
Lundin Gold Corporate Presentation - June 2024
Adnet Communications
 
2024-6-01-IMPACTSilver-Corp-Presentation.pdf
2024-6-01-IMPACTSilver-Corp-Presentation.pdf2024-6-01-IMPACTSilver-Corp-Presentation.pdf
2024-6-01-IMPACTSilver-Corp-Presentation.pdf
hartfordclub1
 
The Evolution and Impact of OTT Platforms: A Deep Dive into the Future of Ent...
The Evolution and Impact of OTT Platforms: A Deep Dive into the Future of Ent...The Evolution and Impact of OTT Platforms: A Deep Dive into the Future of Ent...
The Evolution and Impact of OTT Platforms: A Deep Dive into the Future of Ent...
ABHILASH DUTTA
 
buy old yahoo accounts buy yahoo accounts
buy old yahoo accounts buy yahoo accountsbuy old yahoo accounts buy yahoo accounts
buy old yahoo accounts buy yahoo accounts
Susan Laney
 

Recently uploaded (20)

Business storytelling: key ingredients to a story
Business storytelling: key ingredients to a storyBusiness storytelling: key ingredients to a story
Business storytelling: key ingredients to a story
 
amptalk_RecruitingDeck_english_2024.06.05
amptalk_RecruitingDeck_english_2024.06.05amptalk_RecruitingDeck_english_2024.06.05
amptalk_RecruitingDeck_english_2024.06.05
 
Satta Matka Dpboss Matka Guessing Kalyan Chart Indian Matka Kalyan panel Chart
Satta Matka Dpboss Matka Guessing Kalyan Chart Indian Matka Kalyan panel ChartSatta Matka Dpboss Matka Guessing Kalyan Chart Indian Matka Kalyan panel Chart
Satta Matka Dpboss Matka Guessing Kalyan Chart Indian Matka Kalyan panel Chart
 
Anny Serafina Love - Letter of Recommendation by Kellen Harkins, MS.
Anny Serafina Love - Letter of Recommendation by Kellen Harkins, MS.Anny Serafina Love - Letter of Recommendation by Kellen Harkins, MS.
Anny Serafina Love - Letter of Recommendation by Kellen Harkins, MS.
 
Best Forex Brokers Comparison in INDIA 2024
Best Forex Brokers Comparison in INDIA 2024Best Forex Brokers Comparison in INDIA 2024
Best Forex Brokers Comparison in INDIA 2024
 
Training my puppy and implementation in this story
Training my puppy and implementation in this storyTraining my puppy and implementation in this story
Training my puppy and implementation in this story
 
一比一原版新西兰奥塔哥大学毕业证(otago毕业证)如何办理
一比一原版新西兰奥塔哥大学毕业证(otago毕业证)如何办理一比一原版新西兰奥塔哥大学毕业证(otago毕业证)如何办理
一比一原版新西兰奥塔哥大学毕业证(otago毕业证)如何办理
 
ikea_woodgreen_petscharity_dog-alogue_digital.pdf
ikea_woodgreen_petscharity_dog-alogue_digital.pdfikea_woodgreen_petscharity_dog-alogue_digital.pdf
ikea_woodgreen_petscharity_dog-alogue_digital.pdf
 
LA HUG - Video Testimonials with Chynna Morgan - June 2024
LA HUG - Video Testimonials with Chynna Morgan - June 2024LA HUG - Video Testimonials with Chynna Morgan - June 2024
LA HUG - Video Testimonials with Chynna Morgan - June 2024
 
ModelingMarketingStrategiesMKS.CollumbiaUniversitypdf
ModelingMarketingStrategiesMKS.CollumbiaUniversitypdfModelingMarketingStrategiesMKS.CollumbiaUniversitypdf
ModelingMarketingStrategiesMKS.CollumbiaUniversitypdf
 
The Influence of Marketing Strategy and Market Competition on Business Perfor...
The Influence of Marketing Strategy and Market Competition on Business Perfor...The Influence of Marketing Strategy and Market Competition on Business Perfor...
The Influence of Marketing Strategy and Market Competition on Business Perfor...
 
Creative Web Design Company in Singapore
Creative Web Design Company in SingaporeCreative Web Design Company in Singapore
Creative Web Design Company in Singapore
 
Event Report - SAP Sapphire 2024 Orlando - lots of innovation and old challenges
Event Report - SAP Sapphire 2024 Orlando - lots of innovation and old challengesEvent Report - SAP Sapphire 2024 Orlando - lots of innovation and old challenges
Event Report - SAP Sapphire 2024 Orlando - lots of innovation and old challenges
 
Authentically Social by Corey Perlman - EO Puerto Rico
Authentically Social by Corey Perlman - EO Puerto RicoAuthentically Social by Corey Perlman - EO Puerto Rico
Authentically Social by Corey Perlman - EO Puerto Rico
 
Understanding User Needs and Satisfying Them
Understanding User Needs and Satisfying ThemUnderstanding User Needs and Satisfying Them
Understanding User Needs and Satisfying Them
 
Chapter 7 Final business management sciences .ppt
Chapter 7 Final business management sciences .pptChapter 7 Final business management sciences .ppt
Chapter 7 Final business management sciences .ppt
 
Lundin Gold Corporate Presentation - June 2024
Lundin Gold Corporate Presentation - June 2024Lundin Gold Corporate Presentation - June 2024
Lundin Gold Corporate Presentation - June 2024
 
2024-6-01-IMPACTSilver-Corp-Presentation.pdf
2024-6-01-IMPACTSilver-Corp-Presentation.pdf2024-6-01-IMPACTSilver-Corp-Presentation.pdf
2024-6-01-IMPACTSilver-Corp-Presentation.pdf
 
The Evolution and Impact of OTT Platforms: A Deep Dive into the Future of Ent...
The Evolution and Impact of OTT Platforms: A Deep Dive into the Future of Ent...The Evolution and Impact of OTT Platforms: A Deep Dive into the Future of Ent...
The Evolution and Impact of OTT Platforms: A Deep Dive into the Future of Ent...
 
buy old yahoo accounts buy yahoo accounts
buy old yahoo accounts buy yahoo accountsbuy old yahoo accounts buy yahoo accounts
buy old yahoo accounts buy yahoo accounts
 

ebusiness digital,E business signature .

  • 1. Digital Certificate Digital certificate is issued by a trusted third party which proves sender’s identity to the receiver and receiver’s identity to the sender. A digital certificate is a certificate issued by a Certificate Authority (CA) to verify the identity of the certificate holder. The CA issues an encrypted digital certificate containing the applicant’s public key and a variety of other identification information. Digital certificate is used to attach public key with a particular individual or an entity. Digital certificate contains:- The authenticity 1. Name of certificate holder. 2. Serial number which is used to uniquely identify a certificate, the individual or the entity identified by the certificate 3. Expiration dates. 4. Copy of certificate holder’s public key.(used for decrypting messages and digital signatures) 5. Digital Signature of the certificate issuing authority. Digital certificate is also sent with the digital signature and the message. Digital certificate vs digital signature : Digital signature is used to verify authenticity, integrity, non-repudiation ,i.e. it is assuring that the message is sent by the known user and not modified, while digital certificate is used to verify the identity of the user, maybe sender or receiver. Thus, digital signature and certificate are different kind of things but both are used for security. Most websites use digital certificate to enhance trust of their users
  • 2. Feature Digital Signature Digital Certificate Basics / Definition Digital signature is like a fingerprint or an attachment to a digital document that ensures its authenticity and integrity. Digital certificate is a file that ensures holder’s identity and provides security. Process / Steps Hashed value of original message is encrypted with sender’s secret key to generate the digital signature. It is generated by CA (Certifying Authority) that involves four steps: Key Generation, Registration, Verification, Creation. Security Services Authenticity of Sender, integrity of the document and non-repudiation. It provides security and authenticity of certificate holder. Standard It follows Digital Signature Standard (DSS). It follows X.509 Standard Format
  • 3. Public key– Key which is known to everyone. Ex-public key of A is 7, this information is known to everyone. Private key– Key which is only known to the person who’s private key it is. Digital Signature A digital signature is a mathematical technique used to validate the authenticity and integrity of a message, software, or digital document. Digital signature is electronic signatures, which assure that the message was sent by a particular sender. While performing digital transactions authenticity and integrity should be assured, otherwise, the data can be altered or someone can also act as if he was the sender and expect a reply
  • 4. Types of Internet Security Protocols In today’s world, we transfer the data in bulk, and the security of this data is very important, so Internet security provides that feature i.e., protection of data. There are different types of protocol exist like routing, mail transfer, and remote communication protocol. But the Internet security protocol helps in the security and integrity of data over the internet. There are many protocols that exist that help in the security of data over the internet such as Secure Socket Layer (SSL), Transport Layer Security (TLS). SSL Protocol : •SSL Protocol stands for Secure Sockets Layer protocol, which is an encryption-based Internet security protocol that protects confidentiality and integrity of data. •SSL is used to ensure the privacy and authenticity of data over the internet. •SSL is located between the application and transport layers. •At first, SSL contained security flaws and was quickly replaced by the first version of TLS that’s why SSL is the predecessor of the modern TLS encryption. •TLS/SSL website has “HTTPS” in its URL rather than “HTTP”. •SSL is divided into three sub-protocols: the Handshake Protocol, the Record Protocol, and the Alert Protocol.
  • 5. TLS Protocol : •Same as SSL, TLS which stands for Transport Layer Security is widely used for the privacy and security of data over the internet. •TLS uses a pseudo-random algorithm to generate the master secret which is a key used for the encryption between the protocol client and protocol server. •TLS is basically used for encrypting communication between online servers like a web browser loading a web page in the online server. •TLS also has three sub-protocols the same as SSL protocol – Handshake Protocol, Record Protocol, and Alert Protocol. SHTTP : •SHTTP stands for Secure HyperText Transfer Protocol, which is a collection of security measures like Establishing strong passwords, setting up a firewall, thinking of antivirus protection, and so on designed to secure internet communication. •SHTTP includes data entry forms that are used to input data, which has previously been collected into a database. As well as internet-based transactions. •SHTTP’s services are quite comparable to those of the SSL protocol. •Secure HyperText Transfer Protocol works at the application layer (that defines the shared communications protocols and interface methods used by hosts in a network) and is thus closely linked with HTTP. •SHTTP can authenticate and encrypt HTTP traffic between the client and the server. •SHTTP operates on a message-by-message basis. It can encrypt and sign individual messages.
  • 6. Types of Firewalls in Network Security Nowadays, protecting our sensitive data from unauthorized and unwanted sources has become a significant challenge. There are numerous tools available that can provide various levels of security and aid in the protection of private information stored in any system. A ‘firewall’ is a network security mechanism that protects our systems and data against unauthorized access. A firewall is a cybersecurity device or software application that filters network traffic. A firewall acts as a traffic cop at your computer’s port. A fundamental purpose of a firewall is to create a barrier that separates an internal network from incoming external traffic to block malicious traffic requests and data packets, such as malware and hacking while allowing legitimate traffic to pass through. A firewall enables only the traffic that has been configured to accept, like IP addresses. It differentiates between legitimate and malicious traffic and allows or blocks specific data packets based on predefined security rules.
  • 7. A Firewall is a necessary component of a company’s overall cybersecurity strategy. Most computers have an in-built firewall, but it isn’t always the best option for security. What can a firewall do to keep us safe? It guards computers against unauthorized access. It blocks unwanted content. It provides a secure network when multiple people interact at the same time. It prevents ransomware from spreading. It protects private information, such as online banking credentials. Types of Network Firewall : Packet Filters – It is a technique used to control network access by monitoring outgoing and incoming packets and allowing them to pass or halt based on the source and destination Internet Protocol (IP) addresses, protocols, and ports. This firewall is also known as a static firewall. Stateful Inspection Firewalls – It is also a type of packet filtering which is used to control how data packets move through a firewall. It is also called dynamic packet filtering. These firewalls can inspect that if the packet belongs to a particular session or not. It only permits communication if and only if, the session is perfectly established between two endpoints else it will block the communication.
  • 8. Application Layer Firewalls – These firewalls can examine application layer (of OSI model) information like an HTTP request. If finds some suspicious application that can be responsible for harming our network or that is not safe for our network then it gets blocked right away. Next-generation Firewalls – These firewalls are called intelligent firewalls. These firewalls can perform all the tasks that are performed by the other types of firewalls that we learned previously but on top of that, it includes additional features like application awareness and control, integrated intrusion prevention, and cloud-delivered threat intelligence. Circuit-level gateways – A circuit-level gateway is a firewall that provides User Datagram Protocol (UDP) and Transmission Control Protocol (TCP) connection security and works between an Open Systems Interconnection (OSI) network model’s transport and application layers such as the session layer.
  • 9. Software Firewall – The software firewall is a type of computer software that runs on our computers. It protects our system from any external attacks such as unauthorized access, malicious attacks, etc. by notifying us about the danger that can occur if we open a particular mail or if we try to open a website that is not secure. Hardware Firewall – A hardware firewall is a physical appliance that is deployed to enforce a network boundary. All network links crossing this boundary pass-through this firewall, which enables it to perform an inspection of both inbound and outbound network traffic and enforce access controls and other security policies. Cloud Firewall – These are software-based, cloud-deployed network devices. This cloud-based firewall protects a private network from any unwanted access. Unlike traditional firewalls, a cloud firewall filters data at the cloud level.