Unit 1.CS
Unit 1.CS
These goals form the confidentiality, integrity, availability (CIA) triad, the basis
of all security programs. The CIA triad is a security model that is designed to
guide policies for information security within the premises of an organization or
company. This model is also referred to as the AIC (Availability, Integrity, and
Confidentiality) triad to avoid the confusion with the Central Intelligence
Agency. The elements of the triad are considered the three most crucial
components of security.
1. Confidentiality
Confidentiality is roughly equivalent to privacy and avoids the unauthorized
disclosure of information. It involves the protection of data, providing access for
those who are allowed to see it while disallowing others from learning anything
about its content. It prevents essential information from reaching the wrong
people while making sure that the right people can get it. Data encryption is a
good example to ensure confidentiality.
Encryption
Encryption is a method of transforming information to make it unreadable for
unauthorized users by using an algorithm. The transformation of data uses a secret
key (an encryption key) so that the transformed data can only be read by using
another secret key (decryption key). It protects sensitive data such as credit card
numbers by encoding and transforming data into unreadable cipher text. This
encrypted data can only be read by decrypting it. Asymmetric-key and
symmetric-key are the two primary types of encryption.
Access control
Access control defines rules and policies for limiting access to a system or to
physical or virtual resources. It is a process by which users are granted access and
certain privileges to systems, resources or information. In access control systems,
users need to present credentials before they can be granted access such as a
person's name or a computer's serial number. In physical systems, these
credentials may come in many forms, but credentials that can't be transferred
provide the most security.
Authentication
An authentication is a process that ensures and confirms a user's identity or role
that someone has. It can be done in a number of different ways, but it is usually
based on a combination of-
o something the person has (like a smart card or a radio key for storing secret
keys),
o something the person knows (like a password),
o something the person is (like a human with a fingerprint).
Authentication is the necessity of every organizations because it enables
organizations to keep their networks secure by permitting only authenticated
users to access its protected resources. These resources may include computer
systems, networks, databases, websites and other network-based applications or
services.
Authorization
Authorization is a security mechanism which gives permission to do or have
something. It is used to determine a person or system is allowed access to
resources, based on an access control policy, including computer programs, files,
services, data and application features. It is normally preceded by authentication
for user identity verification. System administrators are typically assigned
permission levels covering all system and user resources. During authorization, a
system verifies an authenticated user's access rules and either grants or refuses
resource access.
Physical Security
Physical security describes measures designed to deny the unauthorized access of
IT assets like facilities, equipment, personnel, resources and other properties from
damage. It protects these assets from physical threats including theft, vandalism,
fire and natural disasters.
2. Integrity
Integrity refers to the methods for ensuring that data is real, accurate and
safeguarded from unauthorized user modification. It is the property that
information has not be altered in an unauthorized way, and that source of the
information is genuine.
Backups
Backup is the periodic archiving of data. It is a process of making copies of data
or data files to use in the event when the original data or data files are lost or
destroyed. It is also used to make copies for historical purposes, such as for
longitudinal studies, statistics or for historical records or to meet the requirements
of a data retention policy. Many applications especially in a Windows
environment, produce backup files using the .BAK file extension.
Checksums
A checksum is a numerical value used to verify the integrity of a file or a data
transfer. In other words, it is the computation of a function that maps the contents
of a file to a numerical value. They are typically used to compare two sets of data
to make sure that they are the same. A checksum function depends on the entire
contents of a file. It is designed in a way that even a small change to the input file
(such as flipping a single bit) likely to results in different output value.
3. Availability
Availability is the property in which information is accessible and modifiable in
a timely fashion by those authorized to do so. It is the guarantee of reliable and
constant access to our sensitive data by authorized people.
Tools for Availability
o Physical Protections
o Computational Redundancies
Physical Protections
Physical safeguard means to keep information available even in the event of
physical challenges. It ensure sensitive information and critical information
technology are housed in secure areas.
Computational redundancies
It is applied as fault tolerant against accidental faults. It protects computers and
storage devices that serve as fallbacks in the case of failures.
We are living in a digital era. Now a day, most of the people use computer and
internet. Due to the dependency on digital things, the illegal computer activity is
growing and changing like any type of crime.
Web-based attacks
These are the attacks which occur on a website or web applications. Some of the
important web-based attacks are as follows
1. Injection attacks
It is the attack in which some data will be injected into a web application to
manipulate the application and fetch the required information.
Example- SQL Injection, code Injection, log Injection, XML Injection etc.
2. DNS Spoofing
3. Session Hijacking
4. Phishing
Phishing is a type of attack which attempts to steal sensitive information like user
login credentials and credit card number. It occurs when an attacker is
masquerading as a trustworthy entity in electronic communication.
5. Brute force
It is a type of attack which uses a trial and error method. This attack generates a
large number of guesses and validates them to obtain actual data like user
password and personal identification number. This attack may be used by
criminals to crack encrypted data, or by security, analysts to test an organization's
network security.
6. Denial of Service
Volume-based attacks- Its goal is to saturate the bandwidth of the attacked site,
and is measured in bit per second.
Protocol attacks- It consumes actual server resources, and is measured in a
packet.
Application layer attacks- Its goal is to crash the web server and is measured in
request per secon
7. Dictionary attacks
This type of attack stored the list of a commonly used password and validated
them to get original password.
8. URL Interpretation
It is a type of attack where we can change the certain parts of a URL, and one can
make a web server to deliver web pages for which he is not authorized to browse.
System-based attacks
These are the attacks which are intended to compromise a computer or a computer
network. Some of the important system-based attacks are as follows-
1. Virus
3. Trojan horse
4. Backdoors
5. Bots
A bot (short for "robot") is an automated process that interacts with other network
services. Some bots program run automatically, while others only execute
commands when they receive specific input. Common examples of bots program
are the crawler, chatroom bots, and malicious bots.
E-Commerce Security
E-commerce security refers to the practices, technologies, and policies designed
to protect online businesses, their websites, and their customers from various
threats, fraud, and unauthorized access. The goal of e-commerce security is to
ensure the safe exchange of data (such as personal information, financial data,
and transaction details) between businesses and customers on e-commerce
platforms.
Computer Forensics
Computer forensics is the process of collecting, analyzing, and interpreting
data from computer systems, networks, and storage devices in a manner that
preserves the integrity of the evidence. This field combines elements of
computer science and law enforcement to investigate cybercrimes, data
breaches, and digital misconduct.
TYPES
Disk Forensics: It deals with extracting raw data from the primary or
secondary storage of the device by searching active, modified, or deleted
files.
Network Forensics: It is a sub-branch of Computer Forensics that involves
monitoring and analyzing the computer network traffic.
Database Forensics: It deals with the study and examination of databases
and their related metadata.
Malware Forensics: It deals with the identification of suspicious code and
studying viruses, worms, etc.
Email Forensics: It deals with emails and their recovery and analysis,
including deleted emails, calendars, and contacts.
Memory Forensics: Deals with collecting data from system memory
(system registers, cache, RAM) in raw form and then analyzing it for further
investigation.
Mobile Phone Forensics: It mainly deals with the examination and analysis
of phones and smartphones and helps to retrieve contacts, call logs,
incoming, and outgoing SMS, etc., and other data present in it.
APPLICATIONS
Intellectual Property theft
Industrial espionage
Employment disputes
Fraud investigations
Misuse of the Internet and email in the workplace
Forgeries related matters
Bankruptcy investigations
Issues concerned the regulatory compliance
Steganogrphy
A steganography technique involves hiding sensitive information within an
information will then be extracted from the ordinary file or message at its
destination, thus avoiding detection. Steganography is an additional step that can
ordinary, non-secret file or message, so that it will not be detected. The sensitive
be used in conjunction with encryption in order to conceal or protect data.
You can use steganography to hide text, video, images, or even audio data. It’s a
helpful bit of knowledge, limited only by the type of medium and the author’s
imagination.
Different Types of Steganography
1. Text Steganography − There is steganography in text files, which entails
secretly storing information. In this method, the hidden data is encoded into the
letter of each word.
Since the computer description of an image contains multiple bits, images are
frequently used as a cover source in digital steganography.
The various terms used to describe image steganography include:
2. Phishing:
Phishing is a social engineering attack where cybercriminals impersonate
legitimate entities (such as banks, companies, or trusted individuals) to trick
people into revealing personal, sensitive information like usernames,
passwords, and credit card details. Phishing is often done via email, fake
websites, or even text messages.
3. Denial of Service (DoS) / Distributed Denial of Service (DDoS):
DoS Attack: The attacker attempts to overwhelm a system, server, or
network by sending an excessive amount of traffic, making it unable to
respond to legitimate user requests. This can cause the system to crash
or become unavailable.
6. Zero-Day Exploits:
A zero-day exploit refers to an attack that targets a vulnerability in a system
that is not yet known to the vendor or developer. Since the vulnerability is
unknown, there is no patch or fix available, and attackers can exploit it before
the vendor becomes aware of it and releases a solution.
7. Credential Stuffing:
Credential stuffing is a type of attack in which cybercriminals use large volumes of previously
stolen username and password combinations (often from previous data breaches) to try to
gain unauthorized access to a variety of online accounts. Since many people reuse
passwords across sites, attackers often succeed with this method.
8. Social Engineering:
Social engineering involves manipulating individuals into divulging confidential information
or performing actions that compromise security. It often relies on psychological
manipulation, such as creating a sense of urgency, trust, or fear. Examples include:
Pretexting: The attacker fabricates a scenario to obtain information or gain access.
Baiting: Offering something appealing (like free software or rewards) to trick victims
into installing malware or revealing personal data.
9. SQL Injection:
SQL injection occurs when attackers insert malicious SQL code into an input field (such as a
login form) to manipulate a database. This can allow them to view, modify, or delete data, or
even take control of the server hosting the database.
10. Cryptojacking:
Cryptojacking is the unauthorized use of someone else’s computer or system resources to
mine cryptocurrency. Attackers often achieve this by infecting a system with malware that
silently uses its processing power to mine crypto, which can significantly slow down the
system and cause wear and tear on the hardware.
Financial Loss: Cyber attacks can result in direct financial losses, whether through
ransom payments, theft of funds, or legal fees.
Reputation Damage: Organizations that suffer security breaches often face a loss of
customer trust and business opportunities.
Legal and Compliance Issues: Many industries are subject to laws and regulations
governing data protection. Security threats that lead to breaches can result in legal
action or fines.
Brute-force guessing attack: A given length has so many potential passwords. If you use a
brute-force attack, it will guarantee that a hacker will eventually crack the password.
Hybrid Attack: It is a combination of Dictionary attack and Brute force attack techniques.
This attack firstly tries to crack the password using the dictionary attack. If it is unsuccessful
in cracking the password, it will use the brute-force attack.
A weak password has very little complexity and is easily guessable. It usually consists of
easy-to-remember words found in the dictionary.
Weak passwords are usually short and easy to crack.
Those who use weak passwords are at a higher risk of having their accounts hacked. They are
also less likely to be able to use the strongest security features available on the internet.Here
are some characteristics of weak passwords:
Short Length: Weak passwords are typically short, often consisting of fewer than eight
characters. Short passwords provide fewer combinations, making them easier to crack.
Lack of Complexity: Weak passwords often lack complexity, containing only lowercase
letters or common words without any special characters, numbers, or a mix of uppercase and
lowercase letters.
Personal Information or User Name: Attackers often use easily obtainable personal
information such as birthdates, names of family members, or pet names as passwords, making
them susceptible to targeted attacks. Also, putting your user name in your password is a big
mistake.
Repeated Characters or Patterns: Passwords that consist of repeated characters (e.g.,
“111111”) or simple patterns (e.g., “abcd1234”) are considered weak because they are easy to
guess or crack using automated tools.
Business or Site Name: Passwords that contain the name of the site or business that the
password accesses.
A strong password describes a password that is difficult to detect by both humans and
computer programs, effectively protecting data from unauthorized access. A strong password
consists of at least six characters (and the more characters, the stronger the password) that are
a combination of letters, numbers and symbols (@, #, $, %, etc.) if allowed. Passwords are
typically case-sensitive, so a strong password contains letters in both uppercase and
lowercase. Strong passwords also do not contain words that can be found in a dictionary or
parts of the user’s own name.
Here are some key characteristics of strong passwords:
Length: This is one of the most important factors. Strong passwords are long, typically
containing 16 characters or more. The longer the password, the more difficult it is to crack, as
it increases the number of possible combinations. This is why passphrases are often
recommended (4-5 unrelated words that have meaning to you.)
Randomness: Strong passwords are not based on easily guessable patterns or personal
information. Instead, they are random combinations of characters that are unrelated to your
personal life or easily guessable information.
Complexity: You can also incorporate a mix of uppercase and lowercase letters, numbers,
and special characters (e.g., !, @, #, $, %). This complexity adds an extra layer of security,
making it harder for attackers to guess or crack the password.
Tips for Creating Strong Passwords
1. Length. The first thing you want to focus on is length. Your password should be at
least 12 characters long. If you need to remember it, it might be helpful to use a
sentence or a phrase. Don’t use anything from a dictionary, song lyrics, or popular
quotes.
2. Mix It Up. The second thing you want to do is mix up your characters. One common
mistake people make is using only letters. You need a variety of characters, including
numbers and symbols. It’s best if you can’t remember a specific pattern you used.
This will make your password much stronger.
3. Avoid Obvious Words. The third thing you want to do is avoid obvious words. If
you use something like “password,” “12345,” or “qwerty,” you are making it very
easy for someone to hack into your account. It’s best to use something like
“h0wDoId0ubtth1s!”
4. Avoid Personal Info. The fourth thing you want to do is avoid using personal
information. It might seem like a good idea, but it’s not. If someone gets their hands
on your password, you don’t want them to know your birthday or address.
5. Make It Random. The fifth thing you want to do is make it random. Don’t make the
mistake of putting together a pattern. Instead, just mix up the letters, numbers, and
symbols in a way that seems random.
6. Use a Password Manager. Finally, you can use a password manager. These are
websites and apps that will help you create long, complex passwords. The best part is
that they also store them in a way that makes them almost impossible to crack.
Network Connection?
A network connection allows devices like computers, smartphones, or tablets to
communicate with each other or access the internet. Examples of networks include
Wi-Fi, mobile data, and Ethernet connections.
Insecure Network Connection?
An insecure network connection is one that does not protect the data being sent
between devices. This means hackers or unauthorized people can intercept, read, or
even modify the information you are sharing.
What to Look For: If a Wi-Fi network does not ask you to enter a password before
connecting, it is likely insecure.
Why It's Insecure: Open networks do not encrypt the data being sent between your device and
the network. This means anyone nearby can intercept your information, such as login
credentials, messages, or emails.
Examples: Free Wi-Fi at coffee shops, malls, or public parks often does not require a
password and is therefore not safe.
2. No HTTPS on Websites
What to Look For: When visiting a website, check the address bar of your browser. Secure
websites begin with "https://" and often show a padlock icon. Insecure websites only show
"http://" and no padlock.
Example: Logging into an HTTP website could expose your username and password to
hackers.
What to Look For: Public networks that anyone can join, like "Free Wi-Fi" or "Guest Wi-Fi,"
are open networks. They may seem convenient but are often insecure.
Why It's Insecure: On these networks, data is usually unencrypted, and there’s no way to
know if the network is operated by a legitimate source. Hackers can set up fake networks
with names similar to popular ones (e.g., "Airport_FreeWiFi") to trick users into connecting.
Example: A Wi-Fi hotspot named “Starbucks-FreeWiFi” could be set up by a hacker, not the
coffee shop.
5. Unencrypted Networks
What to Look For: When you connect to a Wi-Fi network, your device might warn you with
messages like “This network is not secure” or “Data sent over this network might be visible
to others.”
Why It's Insecure: Networks without encryption send data in plain text, making it easy for
hackers to intercept and view. Secure networks use WPA2 or WPA3 encryption to protect
data.
Example: Older networks using outdated security protocols like WEP are less secure and
more vulnerable to attacks.
Malicious Code
What Is Malicious Code?
Malicious code, or malware, refers to any program, script, or related software
designed for the purpose of damaging, disrupting, or compromising systems
and information.
Types of Malicious Code
Understanding the different forms of malicious code is key to developing the necessary
defense mechanisms. Each type works in a different manner and presents different hazards
for organizations as well as for users.Three commonly occurring types of malicious codes
are:
Viruses: Viruses are a form of malware that attach themselves to legitimate files or software
programs. They move when these infected files get executed, either by opening a document
or running a program. Activated viruses can corrupt, alter, or delete data, which translates
into significant data loss and brings operations to a standstill.
Worms: These are self-replicating malware that functions without any user interaction.
Unlike viruses, which require a host file to attack computers, worms can identify network
weaknesses and proactively infect other computers. The more they multiply, the more
bandwidth they can consume and cause congestion and slowdowns or even total system
overloads.
Trojan Horses: Trojan horses also known as Trojan, or Trojan viruses, are a source of
malicious programming that appears to be legitimate software of a completely other
program. It convinces the users to install it under unsuspecting guises as an application or
update. Once they are installed, trojans can cause a variety of harmful actions, for example,
stealing personal data, creating backdoors that enable remote access, or hosting additional
malware. Because they rely on social engineering tactics, user education about the risks of
downloading software from unverified sources is essential to preventing trojan infections.
Ransomware: Ransomware is one of the insidious types of malicious code that encrypts files
in a victim’s system and cannot be accessed by the victim. They demand a ransom for the
decryption key, thereby excluding users from their own data. Loss is very high financially as
well as regarding business operations and also sensitive information. In some instances, this
variant threatens to publish stolen data publicly if the ransom is not paid.
Programing Bugs:
What is a Programming Bug?
A programming bug is an error, flaw, or mistake in a computer program that can cause
unexpected behavior. In cybersecurity, programming bugs can create vulnerabilities that
hackers exploit to steal data, disrupt systems, or gain unauthorized access.
Occurs when a program writes more data into a buffer (temporary memory) than it can hold.
Can overwrite other memory areas, leading to system crashes or allowing attackers to
execute malicious code.
2. SQL Injection
4. Hardcoded Passwords
Occurs when two processes try to access the same resource at the same time.
Hackers can exploit timing issues to gain unauthorized access.
6. Insecure APIs (Application Programming Interfaces)
If APIs do not properly verify user requests, hackers can send fake requests.
This can lead to data leaks, unauthorized actions, and account takeovers.
These types of crimes involve different threats (like viruses, bugs, etc.) and
(DoS) denial-of-service attacks.
Malware: This kind ofcyber threat relates to malware viruses, worms, Trojans,
etc. for interfering, damaging, or unauthorized access to computer systems.
For example, ransomware encrypts files and then later demands ransom
for decryption.
Denial-of-Service (DoS) Attack s: Here, the attackers focus on a system and
flood it with high traffic, hence making it inaccessible to the users. Another
dangerous variant of DoS is DDoS, wherein many compromised systems target
one, thus, much difficult to defend against.
Phishing Attacks: These are masqueraded e-mails or
messages claiming tobe from a formal web but only request that the us grant
access to sensitive information like password points for an account or credit
card numbers. Phishing can be described as an outstanding one of the most
common cyber threats
Botnets: A number of hijacked computers can become a “botnet”
of malware that can be used by an attacker for coordinated attacks
or spamming.
Exploits and Vulnerabilities: The typical area through which cyber-
thieves exploit software weakness is the application or operating
system vulnerability in order to access it illegally.
CYBER TERRORISM:
Definition of Cyber Terrorism
Cyber terrorism refers to the use of digital technologies and the internet to carry out attacks that
cause fear, disruption, or harm to individuals, organizations, or entire nations. The goal of cyber
terrorism is often to cause significant damage to critical infrastructure or destabilize political, social,
or economic systems using cyber tools.
Cyber terrorism is similar to traditional terrorism but differs in that it relies on digital systems and
networks to carry out attacks. It is typically politically or ideologically motivated and aims to create
widespread fear.
Key Components of Cyber Terrorism:
1. Cyber Attacks:
Cyber terrorism involves using malicious software (malware), denial-of-service attacks (DoS),
or other hacking techniques to disrupt or damage computer systems, networks, and data.
o Political Ideology: Groups with extreme political views may use cyber terrorism to
spread propaganda or undermine governments.
o Economic Disruption: Some terrorist groups may target financial institutions, stock
markets, or global trade networks to destabilize economies.
o Psychological Impact: Cyber terrorism creates fear and anxiety among the public by
demonstrating the vulnerabilities of modern society’s reliance on technology.
5. Ransomware Attacks:
Cyber terrorists might use ransomware to lock systems or steal sensitive information and
demand a ransom for its release.
2. Financial Losses:
Cyber terrorism can lead to billions of dollars in damages, including repair costs, loss of
productivity, and the financial fallout from damaged systems or stolen data.
5. Global Consequences:
Given the global interconnectedness of the internet, a cyber attack can have international
implications, affecting trade, diplomacy, and the stability of global relations.
INFORMATION WARFARE AND SURVEILLANCE
1. Cyber Warfare
The use of fake news, social media manipulation, and propaganda to influence people's
opinions and emotions.
Can be used to demoralize soldiers or influence public opinion.
The use of electronic signals, radio waves, and electromagnetic pulses (EMP) to jam enemy
communications and radar systems.
Used in military conflicts to prevent the enemy from receiving or sending messages.
Example: A country disrupts the satellite signals of an opposing country to block their
communication during war.
Example: Fake news is spread that a major bank is closing, causing people to panic and
withdraw all their money.
5. Economic Information Warfare
Example: A hacker group steals billions from a country’s central bank, causing financial
instability.
What is Surveillance?
Surveillance is the monitoring and collection of information about people, organizations,
or countries. It is used for security, intelligence, and law enforcement.
Types of Surveillance
1.Physical Surveillance:
2.Electronic Surveillance:
Surveillance through social media involves tracking posts, comments, and interactions
to monitor behavior, gather data, or identify trends.
Governments, corporations, and even criminal organizations use this method to track
individual or group behaviors and predict or influence actions.
Example: Authorities monitoring social media platforms for signs of protest or
dissent, especially in politically sensitive regions.
4 .Biometric Surveillance:
CRYPTOGRHY / ENCRYPTION
What is Cryptography?
Applications of Cryptography
Digital Currencies: To protect transactions and prevent fraud, digital currencies like Bitcoin
also use cryptography. Complex algorithms and cryptographic keys are used to safeguard
transactions, making it nearly hard to tamper with or forge the transactions.
Secure web browsing: Online browsing security is provided by the use of cryptography,
which shields users from eavesdropping and man-in-the-middle assaults. Public key
cryptography is used by the Secure Sockets Layer (SSL) and Transport Layer Security
(TLS) protocols to encrypt data sent between the web server and the client, establishing a
secure channel for communication.
Electronic Signatures: Electronic signatures serve as the digital equivalent of a handwritten
signature and are used to sign documents. Digital signatures are created using cryptography
and can be validated using public key cryptography. In many nations, electronic signatures
are enforceable by law, and their use is expanding quickly.
Authentication: Cryptography is used for authentication in many different situations, such as
when accessing a bank account, logging into a computer, or using a secure network.
Cryptographic methods are employed by authentication protocols to confirm the user’s
identity and confirm that they have the required access rights to the resource.
DIGITAL SIGNATURE
o Non-repudiation
o Integrity
1. Authentication
3. Integrity
Certified Signatures
The certified digital signature documents display a unique blue ribbon across the top of the
document. The certified signature contains the name of the document signer and the
certificate issuer which indicate the authorship and authenticity of the document.
Approval Signatures
The approval digital signatures on a document can be used in the organization's business
workflow. They help to optimize the organization's approval procedure. The procedure
involves capturing approvals made by us and other individuals and embedding them within
the PDF document. The approval signatures to include details such as an image of our
physical signature, location, date, and official seal.
Visible Digital Signature
The visible digital signature allows a user to sign a single document digitally. This signature
appears on a document in the same way as signatures are signed on a physical document.
Invisible Digital Signature
The invisible digital signatures carry a visual indication of a blue ribbon within a document in
the taskbar. We can use invisible digital signatures when we do not have or do not want to
display our signature but need to provide the authenticity of the document, its integrity, and
its origin.
What is PKI?
PKI is a set of technologies and policies that facilitate the use of public key
cryptography. This cryptography uses pairs of keys: a public key and a private
key. The public key can be shared with anyone, while the private key is kept
secure. Together, they enable secure communication and data encryption.
Digital Certificates:
The RA acts as an intermediary between the user and the CA. It verifies
the user’s identity and requests certificates on their behalf.
These key pairs are the foundation of PKI. The public key encrypts the
data, and the private key decrypts it. Only the private key holder can
decrypt the data that was encrypted with the matching public key.
Key Management:
1. Key Pair Generation: A user or system generates a key pair: a public key
and a private key.
2. Certificate Signing Request (CSR): The user submits a CSR to the CA, which
includes the public key. The CA verifies the user's identity before issuing
the certificate.
3. Certificate Issuance: The CA signs the certificate with its private key,
verifying the user's identity and associating the public key with the user.
5. Digital Signatures: A user can sign data (like a document) using their
private key. Others can verify the signature using the sender's public key
to ensure the data hasn’t been tampered with and that it indeed came
from the sender.
6. Revocation: If a private key is compromised or lost, the user can request
the CA to revoke the associated certificate. This is typically managed via a
Certificate Revocation List (CRL).
Applications of PKI
Email Security: PKI can be used to encrypt emails and authenticate the
sender using digital signatures.
Advantages of PKI
Integrity: Digital signatures ensure that data has not been tampered with.
Physical Surveillance:
This involves monitoring individuals or groups through physical
observation, often by law enforcement or intelligence agencies. It
includes tactics such as shadowing targets, placing individuals under
watch, or using CCTV cameras to monitor behavior in public or private
spaces.
Challenges of PKI