File 1
File 1
Cyber Security
Digital Signature
A digital signature is a special type of electronic signature used to sign and protect documents
sent online. It is considered the safest form of electronic signature compared to others. Digital
signatures follow a standard process called the public key infrastructure (PKI) protocol, which is
accepted worldwide. Because of this, they are viewed as the most secure and are legally
recognized in many countries.
Just like a handwritten signature, a digital signature is unique to each person. It ensures "non-
repudiation," meaning the signer cannot deny signing the document. Digital signatures also
show when a document was signed and can be tracked if needed. They add a layer of security
to prove that the document has not been changed since it was signed, which is crucial for
securely working with documents online.
2
Study Notes-Cyber Security
A digital signature uses a process called the PKI (Public Key Infrastructure) to ensure the
security and authenticity of a document. It works through encryption to verify the sender's
identity. In PKI, two long numbers are created by a computer—called the public key and private
key. These keys work together to lock (encrypt) and unlock (decrypt) information, making sure
that only the correct person can read or sign the document.
3
Study Notes-Cyber Security
A digital signature offers many advantages in handling documents and is more efficient than
traditional signatures. Here are some key benefits:
Digital signatures are widely used by businesses to streamline their processes and secure
important online documents, especially for critical transactions. Some common examples
include:
4
Study Notes-Cyber Security
secure sensitive information and ensure it isn’t altered during sharing between
authorized parties.
5. Government documents
Government agencies must follow strict regulations when handling data. Digital
signatures help ensure that only authorized people can approve documents, while
preventing any unauthorized changes.
6. Shipping documents
Manufacturers can digitally sign shipping documents, making them easier to access and
more secure. This reduces costly shipping errors caused by incorrect or tampered cargo
documents compared to traditional physical copies.
In public-private key cryptography, the public and private keys work together to secure data.
The public key, which anyone can access, is used to encrypt a message. However, only the
owner of the matching private key can decrypt it.
Think of the public key like a business address—it’s available to everyone, and anyone can use it
to send a message. In asymmetric encryption, once a sender has the public key, they use it to
lock (encrypt) their message.
The private key, on the other hand, is like the key to the front door of the business. Only the
owner has it, and it’s used to unlock (decrypt) the message. This ensures that only the intended
recipient can access the encrypted information.
Public and private keys are created using large prime numbers that are mathematically
connected. This connection means that anything encrypted with the public key can only be
decrypted by the matching private key.
However, you can't figure out the private key just by knowing the public key. This makes it safe
to share the public key with anyone, while the private key remains private and is only known to
the owner.
Here’s an easy example of how public and private keys work together:
5
Study Notes-Cyber Security
Bob wants to send an encrypted email to Alice. He uses Alice’s public key (which anyone can
access) to encrypt the message. When Alice receives the email, she uses her private key (known
only to her) to decrypt and read Bob’s message.
Even if attackers try to hack the server and steal the encrypted message, they won’t be able to
read it because they don’t have Alice’s private key. Only Alice can decrypt and access the
message. When Alice replies, she uses Bob’s public key to encrypt her message, and Bob will
use his private key to decrypt it.
There are several common mathematical methods used to create public and private keys. Some
of the well-known algorithms include:
6
Study Notes-Cyber Security
7
Study Notes-Cyber Security
Example: An application permits changes to a primary key. If someone changes this key to point
to another user’s record, they can then view or alter that user’s account.
Example: A financial institution does not sufficiently safeguard its sensitive data, making it
vulnerable to credit card fraud and identity theft.
3. Injection (A03:2021)
Injection has dropped from the top spot to third place, with cross-site scripting now
classified under this category. Essentially, a code injection happens when an attacker
sends invalid data into a web application, causing it to perform actions it wasn’t
intended to do.
Example: An application incorporates untrusted data when creating a vulnerable SQL call.
Example: A movie theater chain offers group booking discounts that require a deposit for
groups larger than 15. Attackers may analyze this system to try booking hundreds of seats
across different theaters in the chain, leading to significant financial losses.
Example: A system still has a default account with its original password active, leaving it open
to exploitation.
8
Study Notes-Cyber Security
Example: A development team might not be fully aware of all the components included in their
application due to the large number used, which could lead to some components being
outdated and vulnerable to attacks.
Example: A web application permits the use of weak or easily guessable passwords, such as
"password1."
Example: Important events that should be recorded, such as logins, failed login attempts, and
other significant activities, are not logged, which puts the application at risk.
9
Study Notes-Cyber Security
URL. This flaw allows an attacker to trick the application into sending a request to an
unintended destination, even if the system has protections like firewalls, VPNs, or
additional network controls. The frequency and severity of SSRF attacks are rising due to
the prevalence of cloud services and the growing complexity of network architectures.
Example: In an unsegmented network setup, attackers can use the response times or
connection results to manipulate SSRF payload connections, helping them to map internal
networks and identify whether ports on internal servers are open or closed.
10