Académique Documents
Professionnel Documents
Culture Documents
BY PRASANTH, Y13
Sub Contents
Digital Certificates
Adding a digital signature
SSL/TLS (Protocols)
Malwares
CA :
Digital signatures rely on public and private keys. Those keys have to be protected in
order to ensure safety and to avoid forgery or malicious use. When you send or sign a
document, you need assurance that the documents and the keys are created securely
and that they are using valid keys.
CAs, a type of Trust Service Provider, are third-party organizations that have been
widely accepted as reliable for ensuring key security and that can provide the necessary
digital certificates.
Both the entity sending the document and the recipient signing it must agree to use a
given CA
1.3 Cryptographic one
way hash function
Typically, this communication is unguarded, meaning it's out in the open and any
interested third party can have a look at it.
As you can imagine, if you're transmitting important personal information having it out in
the open is not an ideal way to do things.
For client authentication, the server uses the public key in the client certificate to decrypt the
data the client sends during handshake.
What’s a handshake??
Secret way to communicate
> Some malware can get on your computer by taking advantage of security vulnerabilities in your operating
system and software programs. Outdated versions of browsers, and often their add-ons or plug-ins as well, are
easy targets.
> Most of the time, however, malware is installed by users (that's you!) overlooking what they're doing and
rushing through program installations that include malicious software. Many programs install malware-ridden
toolbars, download assistants, system and Internet optimizers, bogus antivirus software, and other
tools automatically... unless you explicitly tell them not to.
> Another common source of malware is via software downloads that at first seem to be something safe like a
simple image, video, or audio file, but in reality is a harmful executable file that installs the malicious program
How Do You Protect Yourself From
a Malware Infection?
The most important way to prevent malware from reaching your computer is by making sure
you have an antivirus/antimalware program installed and that you have it configured to
constantly look for signs of malicious activity in downloads and active files.
Beyond software that automatically keeps an eye out for malware, the most important
thing you can do to protect your computer is to change your behavior.
One way is to avoid opening email and other messaging attachments from people or
organizations you don't know or don't trust. Even if you do know the sender, make sure
that whatever is attached is something you were expecting or can follow up about in
another message. One clever way malware is spread is by auto-mailing copies of itself
to friends and family in an email contact list.
Symmetric and Asymmetric Encryption