Professional Documents
Culture Documents
SECURITY TECHNOLOGIES :
FIREWALLS AND VPNS
ICE BREAKER
GUESS THE WORD
ICE BREAKER
GUESS THE WORD
+
ICE BREAKER
GUESS THE WORD
+
F I R E W A L L
ICE BREAKER
GUESS THE WORD
+
ICE BREAKER
GUESS THE WORD
+
A C C E S S C O NT R O L
ICE BREAKER
GUESS THE WORD
+
ICE BREAKER
GUESS THE WORD
+
D I G I T A L S I GNA T UR E
DIGITAL SIGNATURES
WHAT IS A DIGITAL SIGNATURE?
2. INTEGRITY
The message content was not changed or tampered with
since it was digitally signed.
DIGITAL SIGNATURE IS USED TO
ASSURE:
3. NONREPUDIATION
The origin of the signed content is verified to all parties so
the message signer cannot deny association with the signed
content.
THE DIGITAL SIGNATURE PROCESS
BENEFITS OF DIGITAL SIGNATURE
• SECURITY
Security capabilities are embedded in digital signatures to
ensure a legal document isn’t altered and signatures are
legitimate.
• TIMESTAMPING
This provides the date and time of a digital signature and is
useful when timing is critical, such as for stock trades,
lottery ticket issuance and legal proceedings.
BENEFITS OF DIGITAL SIGNATURE
• GLOBALLY ACCEPTED AND LEGALLY COMPLIANT
The public key infrastructure (PKI) standard ensures vendor-
generated keys are made and stored securely. With digital
signatures becoming an international standard, more
countries are accepting them as legally binding.
• TIME SAVINGS
Digital signatures simplify the time-consuming processes of
physical document signing, storage and exchange, enabling
businesses to quickly access and sign documents.
BENEFITS OF DIGITAL SIGNATURE
• COST SAVINGS
Organizations can go paperless and save money previously
spent on the physical resources, time, personnel and office
space used to manage and transport documents.
• KNOWN-MESSAGE ATTACK
The attacker obtains messages the victim sent and a key that
enables the attacker to forge the victim's signature on
documents.
DIGITAL SIGNATURE ATTACKS
• KEY-ONLY ATTACK
The attacker only has access to the victim's public key and
can re-create the victim's signature to digitally sign
documents or messages that the victim doesn't intend to sign.
SECURITY TECHNOLOGIES :
FIREWALLS AND VPNS
WHAT IS A SECURITY TECHNOLOGY?
• PHYSICAL SECURITY
• CYBER SECURITY
1. SECURE ENCRYPTION
To read the data, you need an encryption key. Without one,
it would take millions of years for a computer to decipher
the code in the event of a brute force attack.
BENEFITS OF A VPN CONNECTION