Chapt 5
Chapt 5
1. Digital Certificate :
A digital certificate is a form of electronic credential that can prove the authenticity of a user,
device, server, or website. It uses PKI to help exchange communications and data securely over the
internet.
This form of authentication is a type of cryptography that requires the use of public and private
keys to validate users.
Public key certificates are issued by trusted third parties, a CA, who signs the certificate, thus
verifying the identity of the device or user that is requesting access. To ensure validity, the public
key will be matched with a corresponding private key that only the recipient has knowledge of.
Digital certificates have a specific key pair that they are associated with: one public and one
private.
• User’s name
• Company or department of user
• IP (internet protocol) address or serial number of device
• Copy of the public key from a certificate holder
• Duration of time the certificate is valid for
• Domain certificate is authorized to represent
• Security: Digital certificates can keep internal and external communications confidential
and protect the integrity of the data. It can also provide access control, ensuring only the
intended recipient receives and can access the data.
• Authentication: With a digital certificate, users can be sure that the entity or person they
are communicating with is who they say they are and makes sure that communications
reach only the intended recipient.
• Scalability: Digital certificates can be used across a variety of platforms for individuals and
large and small businesses alike. They can be issued, renewed, and revoked in a matter of
seconds. They can be used to secure a range of user devices and be managed through one
centralized system.
• Reliability: A digital certificate can only be issued by a publicly trusted and rigorously
vetted CA, meaning that they cannot be easily tricked or faked.
• Public trust: The use of a digital certificate proves authenticity of a website, documents, or
emails. It can assure users and clients that the company or individual is genuine and
respects privacy and values security.
The HTTPS (Hypertext Transfer Protocol Secure) designation at the beginning of a web address or
URL (Uniform Resource Locator) indicates the presence of a digital certificate.
When a client computer is presented with the digital certificate from the server, it will then run a
certification path validation to ensure that the subject of the certificate matches the host name.
Within the subject field of the certificate, a primary host name, or Common Name, must be
identified. There can be multiple host names in the case of Subject Alternative Name (SAN)
certificates and Unified Communications Certificates (UCCs).
Public web servers, or internet-facing servers, are required to have a digital certificate signed by a
trusted CA. The TLS/SSL certificates can be domain validated, which is used for websites, or
organization validated, which is used for light business authentication.
The extended validation provides full business authentication. It can offer the highest amount of
security, trust, and authentication.
• Client certificates: This is a form of a digital ID that can identify one machine to another —
a specific user to another user. This can be used to allow a user to access a protected and
secure database and also for email.
With email, often the S/MIME (Secure/Multipurpose Internet Mail Extensions) protocol is used,
which works for communications within an organization. Both parties will need to have copies of
the digital certificate before communicating.
Email messages can be both encrypted and message integrity validated through use of a client
certificate. Each user will need to send a digitally signed message and import the sender’s
certificate ahead of time.
• Code signing certificates: This type of digital certificate involves software or files. The
publisher or developer of software will sign it to validate its authenticity to users
downloading it.
This can be highly beneficial when software is downloaded through a third-party, ensuring that it is
what it should be and has not been tampered with by malicious actors. This can confirm that files
or software downloaded from the internet are valid and authentic.
Websites use digital certificates to create the HTTPS connection, authenticating their validity by
being signed by a trusted CA. This can help a browser to know it is visiting the real website it is
seeking and not a fake or fraudulent one.
Digital certificates are also used in e-commerce to protect sensitive, identification, and financial
information. Online shopping, stock trading, banking, and gaming all use digital certificates. Digital
certificates can be used for electronic credit card holders and merchants to protect the financial
transaction.
Another common use for digital certificates is for email communication. Email can also frequently
contain a digital signature, which sends encrypted messages using a hashing approach.
Organizations can be breached, for example, and cybercriminals can steal certifications and private
key information, allowing them to then distribute malware. An illegitimate certificate can configure
an infected system to trust it, opening the door to attack.
The MITM (man-in-the-middle) attack has also been known to intercept SSL/TLS traffic to gain
access to sensitive information by either creating a fake root CA certificate or installing a rogue
certificate that can then bypass security protocols. Overall, however, the use of digital certificates
to secure websites is considered to be more secure than not using them.
2. Digital Signature:
One of the technological inventions transforming the industry at a rapid rate is
the use of a digital signature. The main idea behind the invention of electronic signature
for banking was to simplify how financial institutions operate.
A digital signature is a technology with the potential of accelerating growth and speed of
financial institutions. As we all know, a signature is a vital necessity in any banking
institution. From opening account, depositing money, withdrawing, and any other activity in
the banking sector.
To exemplify, imagine how much time people waste waiting for their loan document signed
for them to be approved. Think how tedious it is to wait for hours in a line for your bank
documents to be signed. Such time consuming, the inefficient and tedious process is the
one that encouraging bank to adopt digital signature.
So, what are the primary purposes of adoption eSignature solutions for banks?
3. Electronic Signatures:
In general, an electronic signature is data that establish someone’s identity on an
electronic document. There are many types of electronic signatures:
A digital signature is a cryptographic output (made with algorithms) that certifies the
authenticity of an inalterable document accepted by a signer. It is used for advanced and
qualified electronic signatures. Therefore, all digital signatures are electronic, but not the
other way around.
Digital signatures are an excellent way to sign paperwork to open a bank account, government
forms (in some places) and other documents because they’re secure with encryption;
authentic, with a certificate that prevents tampering; fast, for applications and other
bureaucratic processes; convenient, with no need to leave home; and sustainable because they
don’t use paper.
E-Security solutions:
These are Types of Network Security Solutions
Authentication methods
Numerical codes, passwords, and passphrases
Security tokens
Another means of authenticating users is to require them to scan or "swipe" a security
token such as a smart card or similar, or to interact a token with the lock. For example, some locks
can access stored credentials on a personal digital assistant (PDA) or smartphone, by
using infrared, Bluetooth, or NFC data transfer methods.
Biometrics[edit]
As biometrics become more and more prominent as a recognized means of positive
identification, their use in security systems increases. Some electronic locks take advantage of
technologies such as fingerprint scanning, retinal scanning, iris scanning and voice
print identification to authenticate users.
*Transaction security:
Use your login ID and password only on the official login page of the
bank, which should be a secure website. Look for 'https://' in the URL when
logging in; it means that the website is secure. Check your account after
making any transaction online.
Banks secure your transactions and personal information online using
encryption software that converts the information into code that only your bank
can read.
Choose strong and unique passwords · Enable two-factor authentication ·
Steer clear of public Wi-Fi · etc.
*Security devices
Example
1. Private and Public Key Systems: Private systems are symmetric cryptography and a public
systems are asymmetric cryptography. Currently, public key systems are the most common.
2. Symmetric Encryption Systems: The same key is used for both the processes of encryption
and decryption.
3. Asymmetric Encryption Systems: A different key is used for each process. One key is the
public key and the other key is the private key. If something is encrypted with the public key,
then decryption can only be done with the private key. Alternatively, if something is encrypted
with the private key, then decryption must be done only with the public key.
A certificate authority (CA) is the entity providing the keys. The private key will be given to the person
requesting the key. The public key is made public in a directory for users. No one can ever find out
what someone’s private key is, never being available on the Internet. The private key is used for
proving user identity and encrypting the digital certificate. The digital certificate will be decrypted
by the public key, which is used by the message receiver.
But when it comes to making high-value transactions, such as setting up an online cash management
system, even for the so called online banking systems or procuring supplies through the Internet,
there is too much at stake in simply trusting someone just because he gave the correct PIN or the
correct username and password. Developing systems that are able to provide firm authentication of
customers, suppliers and other parties has therefore become a major challenge. Public Key
Infrastructure systems have surfaced as the solution to provide trustworthy identities.
In the case of online banking for users, banks need to have a proper system for authentication of
the user. Even though banks have a secure network system for encrypted data transfer, still the user
is identified using the typical username/id verification process that is vulnerable to hacking. So
implementation of Public Key Infrastructure makes sure that the party performing a transaction over
the Internet is who he claims to be. Later he cannot deny that he has not done a particular
transaction, if he had used his digital certificate.
Besides security, there are other issues related to Public Key Infrastructure – technology, legal
framework and standards. The technology for PKI has been around for more than a decade and is
relatively mature and a number of countries have introduced legislation to recognize the validity of
digital signature.
After introduction of IT Laws by many countries has enabled a standard for business transactions.
Forums like Asia Pacific PKI Forum allows inter-operability to its digital certifying authority licencees
with their counterparts in the member countries of that region. As financial institutions sign on to
these policies and business practices, their customers will create an extensive global system of known
and trusted businesses. Once certified by a Certification Authority, a trading partner can authenticate
any other party with assurance. Even if a trading partner is from another part of the world, the fact
that he is a certified member (through the trust relationship with his bank) makes trading viable and
reduces the risk of transacting in the global system. By virtue of commonly accepted standards,
trading partners will know that:
A firewall is a legal barrier preventing the transference of inside information and the
performance of financial transactions between commercial and investment banks. Restrictions
placed on collaborations between banks and brokerage firms under the Glass-Steagall Act of 1933
acted as a form of firewall. One purpose of a firewall is to ensure banks do not use regular depositors'
money to fund highly speculative activities that could put the bank and depositors at risk.
Types of Firewalls
• Packet filtering
A small amount of data is analyzed and distributed according to the filter’s standards.
• Proxy service
Network security system that protects while filtering messages at the application layer.
• Stateful inspection
Dynamic packet filtering that monitors active connections to determine which network packets
to allow through the Firewall.
• Next Generation Firewall (NGFW)
Deep packet inspection Firewall with application-level inspection.