BUSINESS
REGULATIONS
Presented by
Shwetha
Sneha
Sevanthi
Sai charan
Shreyas
Santhosh
CYBER SPACE
+ Cyberspace refers to the virtual computer world, and more
specifically, an electronic medium that is used to facilitate online
communication.
+ Like for example, you would have sent an email to your friend.
It means that you have sent a message through cyberspace.
Cyberspace’s Advantages
+ Access to information
+ It’s a kind of informational digital library. You may get any
information you want on any subject on the internet.
+ Interaction
+ We now have the capacity to send and receive communications via
electronic mail very instantly and without the need for a computer.
Cyberspace’s Advantages
+ Participation in social networking
+ In cyberspace, social networking is also quite important. It’s impossible
to envision a world without Facebook or Twitter. It has turned into a
fantastic tool for connecting with millions of individuals who have the
same interests.
+ Entertainment
+ Rather than leaving your comfort zone to purchase the latest and
greatest game or Dvds, you may download them. There are several
games available for free download.
DIGITAL SIGNATURE
.
A DIGITAL SIGNATURE is an electronic, encrypted, stamp of authentication on digital information such
as email messages, macros, or electronic documents
ADVANTAGES OF DIGITAL SIGNATURES
+ Speed: Businesses no longer have to wait for paper documents to be sent by
courier. Contracts are easily written, completed, and signed by all concerned
parties in a little amount of time no matter how far the parties are
geographically.
+ Costs: Using postal or courier services for paper documents is much more
expensive compared to using digital signatures on electronic documents.
+ Security: The use of digital signatures and electronic documents reduces
risks of documents being intercepted, read, destroyed, or altered while in
transit.
+ Authenticity: An electronic document signed with a digital signature can
stand up in court just as well as any other signed paper document.
DISADVANTAGES OF DIGITAL SIGNATURE
+ Expiry: Digital signatures, like all technological products, are highly dependent on the
technology . In this era of fast technological advancements, many of these tech products
have a short shelf life.
+ Certificates: In order to effectively use digital signatures, both senders and recipients
may have to buy digital certificates at a cost from trusted certification authorities.
+ Law: In some states and countries, laws regarding cyber and technology-based issues
are weak or even non-existent. Trading in such jurisdictions becomes very risky for
those who use digitally signed electronic documents.
+ Compatibility: There are many different digital signature standards and most of them
are incompatible with each other and this complicates the sharing of digitally signed
documents.
PRIVATE KEY
+ the key of a Key Pair used to create a Digital
Signature This key must be kept private. Private
Key means the key that is kept secret by Customer
that is used to create digital signatures and/or
decrypt electronic records or files that were
encrypted with the corresponding Public Key.
Advantages of private key
1. More secure
2. Faster
3. Best for encryption
4. Work for stream and block ciphers
PUBLIC KEY
+ Public key cryptography is a method of
encrypting or signing data with two
different keys and making one of the
keys, the public key, available for
anyone to use. The other key is known
as the private key. Data encrypted with
the public key can only be decrypted
with the private key.
Disadvantages of public key
+ Possible Performance Disadvantages of Encryption. Public key
encryption works very well and is extremely secure but it's
based on complicated mathematics.
+ Potential Certification Problems. Many public key systems use a
third party to certify the reliability of public keys.
+ Potential for Direct Compromise.
ENCRYPTION
+ Encryption is the method by which information is converted into secret code
that hides the information's true meaning. The science of encrypting and
decrypting information is called cryptography.
In computing, unencrypted data is also known as plain text , and encrypted
data is called cipher text. The formulas used to encode and decode
messages are called encryption algorithms, or ciphers .
To be effective, a cipher includes a variable as part of the algorithm. The
variable, which is called a key , is what makes a cipher's output unique.
When an encrypted message is intercepted by an unauthorized entity, the
intruder has to guess which cipher the sender used to encrypt the message,
as well as what keys were used as variables. The time and difficulty of
guessing this information is what makes encryption such a valuable security
tool.
Encryption has been a longstanding way for sensitive information to be
protected. Historically, it was used by militaries and governments. In
modern times, encryption is used to protect data stored on computers and
storage devices, as well as data in transit over networks.
DIGITAL SIGNATURE CERTIFICATE
A digital signature certificate (DSC) is a key that is affixed to
documents to certify and validate the identity of an individual or
entity signing them. It contains the DSC applicant’s name, country,
pin code, email address, name of the certifying authority, and date of
DSC issuance. It is the secure digital equivalent of physical
certificates and is issued by designated certifying authorities.
Digital Signature Certificate (DSC)
Advantages
+ Identity Validation :Generally, DSCs are used to authenticate the
identity of the signatory. Along with this, it helps in validating the data
issued.
+ Easy and Efficient :Digital Signature Certificate (DSC) is easy to
carry and efficient to use as the authorized signatory can sign multiple
documents online from anywhere at any time
+ • Online Data Surety and Security :Once a document is
digitally signed by the authorized signatory using a digital
signature certificate (DSC), the data cannot be modified or
altered. Hence, we can conclude that a digital signature
certificate (DSC) provides Online Data Surety and Security.