Ca113 - Unit 3-B
Ca113 - Unit 3-B
Authentication : Authentication is a process which verifies the identity of a user who wants
to access the system. In the digital signature, authentication helps to authenticate the
sources of messages.
Integrity : Integrity ensures that the message is real, accurate and safeguards from
unauthorized user modification during the transmission.
1. Key generation algorithm : The key generation algorithm selects private key randomly from
a set of possible private keys. This algorithm provides the private key and its corresponding
public key.
3. Signature verifying algorithm : A signature verifying algorithm either accepts or rejects the
document's authenticity.
Digital signatures are created and verified by using public key cryptography, also known as
asymmetric cryptography. By the use of a public key algorithm, such as RSA, one can generate
two keys that are mathematically linked- one is a private key, and another is a public key.
The procedure used to confirm the user’s identification by this digital signature service provider
makes it even unique. It also provides the two-step verification. The manner of authentication
employed varies as well, from mobile phone biometric scanning to SMS transmission of one-
time passwords. Documents signed using digital signatures are included in this category since
they already have an electronic certificate that is specifically linked to the signatory’s identity.
Class 1: They are only specific certification on an email ID and username, so they cannot be
used for official business documents. Class 1 signatures offer a fundamental level of security and
are applied in situations where there is little risk of data compromise.
Class 2: This is frequently used for the electronic filing (e-filing) of tax papers, such as returns
for both the Goods and Services Tax (GST) and income taxes. Class 2 digital signatures check
the identity of the signer against a database that has already been confirmed. Class 2 signature
are used in contexts with minimal risks and effects of data compromise.
Class 3: The highest level of digital signatures, Class 3 requires the signer to present themselves
before a certification authority to verify their identity. Class 3 digital signatures are used in e-
auctions, e-tendering, e-ticketing, court filings, and other contexts where there are significant
risks to data or consequences from a security breach.
Electronic records, also known as digital records or e-records, refer to any information that is
recorded, stored, and transmitted in digital format.
1. Text Documents: Text documents are one of the most basic types of electronic records. They
include word processing files, such as those created with Microsoft Word, Google Docs, or plain
text editors. Text documents may contain written content, tables, lists, and other textual
information.
2. Spreadsheets: Spreadsheets are electronic records used for organizing, analyzing, and
manipulating data in tabular format. They are commonly created with software like Microsoft
Excel, Google Sheets, or OpenOffice Calc. Spreadsheets can store numerical data, perform
calculations, and generate charts and graphs.
3. Presentations: Presentation files are used to create slideshows for delivering visual
presentations. They often include text, images, graphics, and multimedia elements. Common
presentation software includes Microsoft PowerPoint, Google Slides.
Biometrics
Biometrics is the measurement and statistical analysis of people's unique physical and behavioral
characteristics. The technology is mainly used for identification and access control or for
identifying individuals who are under surveillance.
1. Fingerprint Recognition: Utilizes the unique patterns of ridges and valleys on a person's
fingertips.
2. Facial Recognition: Analyzes facial features, such as the distance between eyes, nose, and
mouth, to identify individuals.
3. Iris Recognition: Scans the intricate patterns in the iris of the eye, which are unique to each
individual.
4. Retina Recognition: Examines the patterns of blood vessels at the back of the eye.
5. Voice Recognition: Analyzes the unique characteristics of an individual's voice, such as pitch,
tone, and cadence.
6. Hand Geometry Recognition: Measures and analyzes the shape and size of the hand, including
length and width of fingers.
7. Vein Recognition: Maps the pattern of veins in the palm or back of the hand.
8. DNA Recognition: Analyzes the unique genetic code of individuals for identification purposes,
though it's less commonly used due to complexity and invasiveness.
10. Ear Recognition: Analyzes the shape and structure of the ear, which is unique to each person.
1. Identity Theft: Criminals may steal biometric data, such as fingerprints or facial recognition
patterns, to impersonate individuals or gain unauthorized access to sensitive information or
facilities.
2. Biometric Spoofing: This involves creating fake biometric data to deceive biometric
authentication systems. For example, using a high-resolution photograph to spoof facial
recognition systems or creating synthetic fingerprints to fool fingerprint scanners.
3. Biometric Data Breaches: If databases containing biometric data are compromised, it can lead
to serious privacy and security issues. Biometric data breaches can expose individuals to identity
theft, fraud, and unauthorized access.
4. Biometric Data Tampering: Criminals may attempt to manipulate biometric data to alter
someone's identity or create false records in databases.
5. Blackmail and Extortion: Criminals may use stolen biometric data to blackmail individuals,
threatening to expose sensitive information or misuse their identity.
6. Surveillance and Tracking: Unauthorized use of biometric surveillance systems for tracking
individuals without their consent or knowledge can infringe upon privacy rights and potentially
lead to stalking or harassment.
7. Forgery and Fraud: Criminals may use stolen biometric data to create forged documents or
commit financial fraud, such as accessing bank accounts or making unauthorized transactions.
8. Unlawful Access: Criminals may use stolen biometric credentials to gain unauthorized access to
secure locations, systems, or devices, bypassing traditional security measures.
10. Unauthorized Biometric Data Collection: Illegal collection of biometric data without consent
or in violation of privacy laws can result in legal consequences for individuals or organizations
involved.
Advantages of biometrics
nontransferable; and
Disadvantages:
If the system fails to capture all of the biometric data, it can lead to failure in identifying a
user.
Errors such as false rejects and false accepts can still happen.
If a user gets injured, then a biometric authentication system may not work -- for example, if
a user burns their hand, then a fingerprint scanner may not be able to identify them.
Digital Forensics is the process of preserving, obtaining, analyzing, and presenting electronic
data so that it can be used as evidence.
Types of Digital Forensics:
Computer Forensics: This involves the recovery and analysis of data stored on computers
and other digital devices, such as hard drives, flash drives, and memory cards. The goal is
to uncover hidden or deleted files, recover lost or damaged data, and preserve evidence for
use in criminal or civil investigations.
Network Forensics :This type of Digital Forensics results in monitoring, analysis, and
preservation of network traffic to identify cyber security threats, investigate cybercrime, or
recover lost or stolen data.
Web Forensics : This involves the analysis of data related to web-based activities, such as
web pages, web server logs, and email communications. The goal is to uncover evidence of
cybercrime, investigate security breaches, or recover lost or stolen data.
Mobile device Forensics : Recovery and examination of data from mobile devices, such as
tablets and smartphones are known as mobile device forensics. This method of forensic
analysis is used to look into incidents including the loss or theft of a device, the recovery of
deleted data, or the inspection of a device as part of a criminal investigation.
Memory Forensics : This involves the analysis of data stored in a computer’s RAM. The
goal is to recover data that may not be stored on disk or other storage media and to
uncover hidden or malicious processes or activities.
Digital Forensics is a branch of forensic science which includes the identification, collection,
analysis and reporting any valuable digital information in the digital devices related to the
computer crimes, as a part of the investigation. In simple words, Digital Forensics is the process
of identifying, preserving, analyzing and presenting digital evidences.. It consists of 5 steps at
high leve
1. Identification of evidence: It includes of identifying evidences related to the digital crime in
storage media, hardware, operating system, network and/or applications. It is the most
important and basic step.
2. Collection: It includes preserving the digital evidences identified in the first step so that they
doesn’t degrade to vanish with time. Preserving the digital evidences is very important and
crucial.
3. Analysis: It includes analyzing the collected digital evidences of the committed computer
crime in order to trace the criminal and possible path used to breach into the system.
4. Documentation: It includes the proper documentation of the whole digital investigation,
digital evidences, loop holes of the attacked system etc. so that the case can be studied and
analysed in future also and can be presented in the court in a proper format.
5. Presentation: It includes the presentation of all the digital evidences and documentation in
the court in order to prove the digital crime committed and identify the criminal.